Academia.eduAcademia.edu

Outline

International Journal of Computer Science IJCSIS June 2015

Abstract

The International Journal of Computer Science and Information Security (IJCSIS) is a refereed, international publication featuring the latest research findings and industry solutions involving all aspects of computing and security. The editorial board is pleased to present the June 2015 issue. The purpose of this edition is to disseminate experimental and theoretical research from both industry and academia in the broad areas of Computer Science, ICT & Security and further bring together people who work in the relevant areas. As the editors of this issue, we are glad to see variety of articles focusing on the major topics of innovation and computer science; computer security, interdisciplinary applications, information technologies etc. This journal promotes excellent research publications which offer significant contribution to the computer science knowledge and which are of high interest to a wide academic/research/practitioner audience. Over the last five years, we have witnessed significant growth of IJCSIS in several key areas, include the expansion of scope to recruit papers from emerging areas of green & sustainable computing, cloud computing security, forensics, mobile computing and big data analytics. IJCSIS archives all publications in major academic/scientific databases and is indexed by the following International agencies and institutions: Google Scholar, CiteSeerX, Cornell’s University Library, Ei Compendex, Scopus, DBLP, DOAJ, ProQuest, ArXiv, ResearchGate and EBSCO. We are indebted to the wonderful team of publication staff members, associate editors, and reviewers for their dedicated services to select and publish extremely high quality papers for publication in IJCSIS. In particular, I would like to thank all associate editors who have answered the frequent calls to process the papers assigned to them in a timely fashion. I would also like to thank the authors for submitting their high quality papers to IJCSIS and the readers for continued support to IJCSIS by citing papers published in IJCSIS. Without their continued and unselfish commitments, IJCSIS would not have achieved its current premier status. We support researchers to succeed by providing high visibility & impact value, prestige and efficient publication process & service. For further questions please do not hesitate to contact us at ijcsiseditor@gmail.com. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 13, No. 6, June 2015 Edition ISSN 1947-5500 © IJCSIS, USA.

References (315)

  1. A. Jain, "Biometric authentication", http://www.scholarpedia.org- /article/ biometric-authentication, Scholarpedia, doi:10.4249/scholarpedia.3716, Revision no. 91064, 2008.
  2. D. Stinson, "Cryptography: theory and practice", CRC Press Inc., Boca Raton, 1995.
  3. A. Jain and A. Kumar,"Biometrics history", http://www.biometrics- .gov-documents-biohistory.pdf, pp. 127, Jun. 2012.
  4. C. Parnpanomchai and A. Phaisitkulwiwat, "Fingerprint recognition by Euclidean distance", Second International Conference on Com- puter and Network Technology 978-0-7695-4042-9, pp. 437-441, Jan. 2010.
  5. B. Bhanu and X. Zhou, "Feature fusion of side face and gait for video-based human identification", ELSEVIER Journal of Pattern the Recognition Society 41, pp. 778-795, Apr. 2008.
  6. I. Marques and M. Grana, "Face recognition algorithms", Proyecto Fin de Carrera, Aug. 2010.
  7. S. Sonkamble, R. Thool, and B. Sonkamble, "Survey of biometric recognition systems and their applications", ELSIVIER-Journal of Theoretical and Pllied Information Technology, pp. 45-51, Jun. 2010.
  8. S. Du and R. Ward, "Face recognition under pose variations", Journal of The Fanklin Institute, pp. 596-613, Nov. 2006.
  9. "Face recognition", National Science and Technology Council, Com- mittee on Technology, Committee on Homeland and National Secu- rity, Subcommittee on biometrics, Aug. 2006.
  10. L. Chan, S. Salleh, and C. Ting, "Face biometrics based on principal component analysis and linear discriminant analysis", Journal of Computer Science, vol. 6, pp. 693-699, Mar. 2010.
  11. E. Vezzetti and F. Marcolin, "Geometrical descriptions for human face morphological analysis and recognition", ELSIVIER-Robotics and Autonomous Systems, vol. 60, pp. 928-939, Jul. 2012.
  12. B. Hwang, M. Roh, and S. Lee, "Performance evaluation of face recognition algorithms on asian face database", Proceedings of the sixth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 1-6, Dec. 2004.
  13. F. Sayeed, M. Hanmandlu, and A. Ansari, "Face recognition using segmental euclidean distance", The Defense Science Journal, vol. 61, pp. 431-442, Oct. 2011.
  14. J. Li and B. Lu, "An adaptive image euclidean distance", ELSIVIER- Pattern Recognition, vol. 42, pp. 349-357, May 2009.
  15. J. Kalita and K. Das, "Recognition of facial expression using eigenvector based distributed features and euclidean distance based decision making technique", International Journal of Advanced Com- puter Science and Applications, vol. 4, pp. 196-202, Sep. 2013.
  16. C. Pornpanomchai and C. Inkuna, "Human face recognition by euclidean distance and neural network", SPIE-Second International Conference on Image Processing, vol. 7546, pp. 1-6, May 2010.
  17. H. Lu, K. Plataniotis, and A. Venetsanopoulos, "Uncorrelated mul- tilinear Principal Component Analysis for unsupervised multilinear subspace learning", IEEE Transactions on Neural Networks, vol. 20, no. 11, pp. 18201836, Nov. 2009.
  18. M. Nounou, B. Bakshi, P. Goel, and X. Shen, "Bayesian Principal Component Analysis", Journal of Chemometrics, vol. 11, pp. 576 595, Aug. 2002.
  19. J. Suo, L. Lin, and S. Shan, "High-resolution face fusion for gender conversion", IEEE Transactions on Systems, Man and Cybernetics, vol. 41, no. 2, pp. 226237, Jan. 2011.
  20. L. Lin, T. Wu, J. Porway, and Z. Xu, "A stochastic graph grammer for compositional object representation and recognition", Pattern Recognition, Elsevier, vol. 42, no. 7, pp. 12971307, Apr. 2009.
  21. O. Malek, A. Venetsonoupoulous, D. Androutsos, and L. Zhao, "Sequential subspace estimator for biometric authentication", ELSEVIER-Neurocomputing, vol. 148, pp. 294-309, Jan. 2015.
  22. O. Malek, A. Venetsonoupoulous, and D. Androutsos, "Facial bio- metrics based on 2D vector geometry", Biometric and Surveillance Technology for Human and Activity Identification XI, SPIE Proceed- ings, vol. 9075, May 2014.
  23. O. Malek, A. Venetsonoupoulous, D. Androutsos, and L. Zhao, "Subspace state estimator for facial biometric verification", IEEE Pro- ceedings of The International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, vol. 1, pp. 137-143, Mar. 2014.
  24. A. Kasinski and A. Florek, "The Put Face Database", A Schmidt Image Processing and Communications, vol. 13, 2008.
  25. V. Jain and A. Mukherjee, The Indian Face Database, http://www.cs.umass.edu/ vidit/IndianFaceDatabase/, 2002.
  26. S. Milborrow, J. Morkel, and F. Nicolls, "The MUCT Landmarked Face Database", University of Captown, Oct. 2009.
  27. S. Haykin, Kalman Filtering and Neural Networks, Wiley- Interscience, 2001.
  28. L. Smith, "A tutorial on Principal Components Analysis", Tech. Rep., 2002. REFERENCES
  29. P.E.S.N. K. Prasasd, A.S.N. Chakravarthy, and B. D. C. N. Prasad, "Performance Evaluation of Password Authentication using Associative Neural Memory Models", International Journal of Advanced Information Technology (IJAIT), vol. 2, no. 1, pp. 75-85, 2012.
  30. A. Hiltgen, T. Kramp, T. Weigold, "Secure Internet Banking Authentication", IEEE Transactions on Security and Privacy, vol. 4, no. 2, pp. 21-29, 2006.
  31. Sh. Kalra, S. Sood, "Advanced remote user authentication protocol for multi-server architecture based on ECC", journal of information secu rity and applications, vol. 18, pp. 98- 107, 2013.
  32. D. Chatterjee, J. Nath, S. Mondal, S. Dasgupta and Asoke Nath, "Advanced Symmetric key Cryptography using ex- tended MSA method: DJSSA symmetric key algorithm", Jounal of Computing, vol. 3, no. 2, pp. 66-71, 2011.
  33. J. Malik, D. Girdhar, R. Dahiya, and G. Sainarayanan, "Multifactor Authentication Using a QR Code and a One- Time Password", J Inf Process Syst, vol.10, no.3, pp.483- 490, 2014.
  34. M. V. Prakash, P. A. Infant, and S. J. Shobana,"Eliminating Vulnerable Attacks Using One Time Password and PassText Analytical Study of Blended Schema",Universal Journal of Computer Science and Engineering Technology, vol. 1, no. 2, pp. 133-140, 2010.
  35. RM. Muthaiah and N. Krishnamoorthy,"An Efficient Tech- nique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive", International Journal of Computer Applications, vol. 100 , no.14, 2014.
  36. A. Kumar, Km. Pooja, "Steganography-A Data Hiding Tech- nique", International Journal of Computer Applications, vol.
  37. A. A. Elngar, K. A. El Dahshan, E. K. Elsayed, and A. Aboshosha, " Enhanced RC4 Encryption Method based on Dynamic EA Key Generation, Al-Azhar University Engineer- ing Journal, JAUES, vol. 9, no. 8, 2014
  38. IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015
  39. D. Sonawane, M. Upadhye, P. Bhogade, and S. Bajpai, "QR Based Advanced Authentication for all Hardware Platforms", International Journal of Scientific and Research Publications, vol. 4, no. 1, 2014.
  40. D. Pintor, "QRP: An improved secure authentication method using QR codes", Maestre Universitat Oberta de Catalunya, Barcelona, Spain, 2012.
  41. A. Aboshosha, Kamal A. El Dahshan, Eman K. Elsayed, and Ahmed A. Elngar, "An Intelligent Secure Authentication Pro- tocol for CMS Applications, Al-Azhar UniversityWorkshops Advances in Computer Research Work(ACR-2015), 2015.
  42. M. Al Fairuz and K. Renaud. "Multi-channel, multi-level authentication for more secure ebanking". In ISSA, 2010.
  43. E.Kalaikavitha, and J. gnanaselvi, "Secure Login Using En- crypted One Time Password (Otp) and Mobile Based Login Methodology", Research Inventy: International Journal Of Engineering And Science, vol.2, no. 10, pp. 14-17, 2013.
  44. S. Hamdare, V. Nagpurkar, and J. Mittal, "Securing SMS Based One Time Password Technique from Man in the Middle Attack", International Journal of Engineering Trends and Technology (IJETT), vol. 11, no. 3, 2014.
  45. A. A. Khan, M. S. Market, "Preventing Phishing Attacks using One Time Password and User Machine Identification", International Journal of Computer Applications, vol. 68, no.3, 2013.
  46. S. Gupta ,A. Chattopadhyay ,K. Sinha ,S. Maitra , and B. Sinha, "High-performance hardware implementation for RC4 stream cipher", IEEE Trans Comput, vol. 62, no. 4 , pp. 730 -743, 2013.
  47. A. Aboshosha, K. A. ElDahshan, E. K. Elsayed, and A. A. Elngar, "EA Based Dynamic Key Generation in RC4 Ci- phering Applied to CMS", International Journal of Network Security, vol.17, no.4, pp. 405-412, 2015.
  48. A. Gaikwad, K.R.Singh, "Information Hiding using Image Embedding in QR Codes for Color Images: A Review", International Journal of Computer Science and Information Technologies, vol. 6, no. 1, pp. 278-283, 2015.
  49. R. Divya, S. Muthukumarasamy, "Visual Authentication Us- ing QR Code to Prevent Keylogging", International Journal of Engineering Trends and Technology, vol. 20, no. 3, 2015.
  50. A. Hole , M. Jadhav , Sh. Kad , and S. Shinde, "Encryption and Decryption of Data Using QR Authentication System", International Journal of Computer Science and Mobile Com- puting, vol. 3, no. 4, pp. 488-496, 2014.
  51. Lu Yan, Yan Zhang, Laurence T. Yang, Huansheng Ning. THE INTERNET OF THINGS--From RFID to the Next-Generation Pervasive Networked Systems. Auerbach Publications. 2008.
  52. Santucci, G.: The internet of things: Between the revolution of the internet and the metamorphosis of objects.
  53. Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S.: Vision and challenges for realising the internet of things. CERP-IoT, European Commission, Luxembourg (2010)
  54. Bock, T.: Lisa smart walls
  55. Möller, A., Scherr, J., Roalter, L., Diewald, S., Hammerla, N., Plötz, T., Olivier, P., Kranz, M.: Gymskill: Mobile exercise skill assessment to support personal health and fitness. In: Ninth International Conference on Pervasive Computing (Pervasive 2011), Video Proceedings, San Francisco, CA, USA (June 2011)
  56. Möller, A., Diewald, S., Roalter, L., Kranz, M.: Mobimed: comparing object identification techniques on smartphones. In: Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design. NordiCHI '12, New York, NY, USA, ACM (2012) 31-40
  57. Haller, S., Karnouskos, S., Schroth, C.: The internet of things in an enterprise context. In Domingue, J., Fensel, D., Traverso, P., eds.: Future Internet FIS 2008. Volume 5468 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg (2009)
  58. Istepanian, R.S.H., Sungoor, A., Faisal, A., Philip, N.: Internet of m-health things. In: Assisted Living 2011, IET Seminar on. (april 2011) 1 -3
  59. Davie, B., Florance, V., Friede, A., Sheehan, J., Sisk, J.: Bringing health-care applications to the internet. Internet Computing, IEEE 5(3) (may/jun 2001) 42 -48
  60. Intel: The internet of things (2012)
  61. Haller, S., Karnouskos, S., Schroth, C.: The internet of things in an enterprise context. Future Internet-FIS 2008 (2009) 14-28
  62. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer Networks 54(15) (2010) 2787-2805
  63. Associati, C.: The evolution of internet of things. (February 2011) 16
  64. Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S.: Vision and challenges for realising the internet of things. CERP-IoT, European Commission, Luxembourg (2010)
  65. Roalter, L., Möller, A., Diewald, S., Kranz, M.: Developing Intelligent Environments: A Development Tool Chain for Creation, Testing and Simulation of Smart and Intelligent Environments. In: Proceedings of the 7th International Conference on Intelligent Environments (IE). (july 2011) 214- 221
  66. Möller, A., Kranz, M., Huitl, R., Diewald, S., Roalter, L.: A mobile indoor navigation system interface adapted to vision- based localization. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. MUM '12, New York, NY, USA, ACM (2012) 4:1-4:10
  67. Cirillo, M.: Proactive assistance in ecologies of physically embedded intelligent systems: A constraint-based approach. (2011) 534-538
  68. Alendal, M.: The social web of things -a social network for your devices
  69. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context Aware Computing for The Internet of Things: A Survey" IEEE Communications Surveys & Tutorials, 2013, pp. 1-41
  70. J. Sathish Kumar and Dhiren R. Patel, "A Survey on Internet of Things: Security and Privacy Issues" International Journal of Computer Applications 2014 vol. 90 no. 11 pp. 20-26
  71. M u Farooq, Muhammad Waseem, Sadia Mazhar, Anjum Khairi and Talha Kamal. Article: A Review on Internet of Things (IoT). International Journal of Computer Applications 113(1):1-7, March 2015
  72. Marwah, Qudsia Mateen and Mehreen Sirshar. Article: Software Quality Assurance in Internet of Things. International Journal of Computer Applications 109(9):16-24, January 2015
  73. Aadhityan A. Article: A Novel Method for Developing Robotics via Artificial Intelligence and Internet of Things. IJCA Proceedings on National Conference on Future Computing 2014 NCFC 2014(1):1-4, January 2014
  74. M u Farooq, Muhammad Waseem, Anjum Khairi and Sadia Mazhar. Article: A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications 111(7):1-6, February 2015.
  75. Mari Carmen Domingo, An overview of the Internet of Things for people with disabilities, Journal of Network and Computer Applications, Volume 35, Issue 2, March 2012, Pages 584-596, ISSN 1084-8045,
  76. Luigi Atzori, Antonio Iera, Giacomo Morabito, The Internet of Things: A survey, Computer Networks, Volume 54, Issue 15, 28 October 2010, Pages 2787-2805, ISSN 1389-1286,
  77. Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, Imrich Chlamtac, Internet of things: Vision, applications and research challenges, Ad Hoc Networks, Volume 10, Issue 7, September 2012, Pages 1497-1516, ISSN 1570-8705
  78. Khalid El Gholami, Kun-mean Hou and Najib Elkamoun. Article: Enhanced Superframe Structure of the IEEE802.15.4 Standard for Real-time Data Transmission in Star Network. International Journal of Computer Applications 51(15):26-32, August 2012.
  79. A. Doegar, A. Prasad, and H. Aslaksen, "Indian Calendars", Theses, Research in Mathematics (MA3 288), 2003.
  80. J. Spate, K. Gibert, E. Miquel, J. Frank, J. Comas, I. Athanasiadis, and R. Letcher, "Data Mining as a Tool for Environmental Scientists", Elsevier Book Series for Developments in Integrated Environmental Assessment, 3, pp. 205-228.
  81. E. Ikoma, K. Taniguchi, T. Koike, and M. Kitsuregawa, "Development of a data mining application for huge scale earth environmental data archives", Intl. J. of Computational Science and Engineering, 2(5/6), 2006, pp. 262-270.
  82. S. Dzeroski, "Environmental Applications of Data Mining", Lecture Notes of Knowledge Technologies, University of Trento.
  83. J. Han, and M. Kamber, Data Mining: Concepts and Techniques, 2nd ed. Morgan Kaufmann, 2006.
  84. M. H. Dunham, Data Mining Introductory and Advanced Topics, India- Pearson Education, Reprint, 2005.
  85. B. Liu, Association Rules and Sequential Pattern in Web data mining: exploring hyperlinks, contents and usage data. Berlin Heidelberg: Springer-Verlag, 2007, pp. 13-54.
  86. J. Deogun, and L. Jiang, "Prediction Mining -An Approach to Mining Association Rules for Prediction", RSFDGrC 2005, Springer-Verlag Berlin Heidelberg, LNAI 3642, 2005, pp. 98-108.
  87. F. Olaiya, "Application of Data Mining Techniques in Weather Prediction and Climate Change Studies", International Journal of Information Engineering and Electronic Business, vol. 1, 2012, pp. 51- 59.
  88. T. R. Sivaramakrishnan, and S. Meganathan, "Association Rule Mining and Classifier Approach for Quantitative Spot Rainfall Prediction", Journal of Theoretical and Applied Information Technology, vol. 34, Issue. 2, 2011.
  89. E. Parvinnia, "The application of association rule mining a case study: The effect of atmospheric parameters on air pollution", Intl. Conf. Applied Computing, ISBN:978-972-8924-30-0, 2007, pp. 745-748.
  90. Z. Liang, T. Xinming,and J. Wenliang, "Temporal Association Rule Mining Based On T-Apriori Algorithm and its Typical Application", Intl. Symposium on Spatial-Temporal Modeling Analysis, vol. 5, Issue. 2, 2005.
  91. Z. Guo, X. Dai, and H. Lin, "Application of Association Rule in Disaster Weather Forecasting Annals of GIS", Intl. Association of Chinese Professionals in Geographic Information Science (CPGIS), vol. 10, No. 1, 2004, pp. 68 -72.
  92. K. Koperski, and J. Han, "Discovery of spatial association rules in geographic information databases", in the 4th Intl Symposium on large spatial databases (SSD95), Maine, USA, 1995, pp. 47-66.
  93. E. Yafi, A. S. Al-hegami, M. A. Alam, and R. Biswas, "Incremental Mining of Shocking Association Patterns," Engineering and Technology, 2009, pp. 801-805.
  94. Y. P. Huang, L. J. Kao, and F. E. Sandnes, "Predicting Ocean Salinity and Temperature Variations Using Data Mining and Fuzzy Inference", Intl. Journal of Fuzzy Systems, vol. 9, Issue. 3, 2007.
  95. S. N. Kohail, A. M. El-Halees, "Implementation of Data Mining Techniques for Meteorological Data Analysis", Intl. Journal of Information and Communication Technology Research (JICT), vol. 1, Issue. 3, 2011.
  96. F. Dadaser-Celik, M. Celik, and A. S. Dokuz, "Associations Between Stream Flow and Climatic Variables at Kizilirmak River Basin in Turkey", Global NEST Journal, vol. 14 (3), 2012, pp. 354-361.
  97. D. P. Rana, N. J. Mistry, and M. M. Raghuwanshi, "Temporal Association Rule Mining Analysis For Days Temperature", International V. REFERENCES
  98. P. Phillips ; W. Scruggs ;
  99. O A. Toole ; P. Flynn ; Bowyer K..; C. Schott & Sharpe M. (2013). FRVT 2012 and ICE 2012 large-scale results, NIST Technical Report NISTIR 7408
  100. N. Ramanathan ; A. Chowdhury ; & R. Chellappa (2004). Facial similarity across age, disguise, illumination and pose, Proceedings of International Conference on Image Processing, Vol. 3, pp. 2010-2012
  101. P. Silva & A.S. Rosa (2013). Face recognition based on Eigen eyes. Pattern Recognition and Image Analysis, Vol. 13, No. 2, pp. 335-338
  102. T. Sim ; S. Baker & Basat M. (2003). "The CMU pose, illumination, and expression database". IEEE Transactions on "Pattern Analysis and Machine Intelligence", Vol. 25, No. 12, pp.1615-1618
  103. Singh, R.; Vatsa, M. & Noore A., (2013). Face recognition with disguise and single gallery images. Image and Vision Computing, doi:10.1016/j.imavis.2010.06.010
  104. Image smoothening and edge detection techniques (2012-2013) by Carlos Bazan and Peter Blomgren [San Diego University, California].
  105. Zhao, W.-Y.; Chellappa, R.; Phillips, P. J. & Rosenfeld A. (2013). Face matching: A literature survey. ACM Computing Survey, Vol. 35, No. 4, pp. 399-458.
  106. public SimpleWebServer () throws Exception { 18. dServerSocket = new ServerSocket (PORT);
  107. /* then process the client's request */ 25. processRequest(s);
  108. /* Reads the HTTP request from the client, and 29.
  109. /* read the HTTP request from the client */ 40. String request = br.readLine();
  110. String command = null;
  111. new StringTokenizer (request, " ");
  112. 54. else { 55. /* if the request is a NOT a GET, 56. return an error saying this server 57. does not implement the requested command */ 58. osw.write ("HTTP/1.0 501 Not Implemented\n\n");
  113. 63. public void serveFile (OutputStreamWriter osw, 64. String pathname) throws Exception { 65. FileReader fr=null; 66. int c=-1;
  114. StringBuffer sb = new StringBuffer();
  115. /* if there was no filename specified by the 73. client, serve the "index.html" file */ 74. if (pathname.equals(""))
  116. 78. fr = new FileReader (pathname);
  117. Kern, Christoph; Kesavan , Anita; Daswani, Neil . Foundations of Security: What Every Programmer Needs To Know . USA. Apress (publishing house), 2007.
  118. GONÇALVES, Edson. Desenvolvendo Aplicações Web com JSP, Servlets, JavaServer Faces, Hibernate, EJB 3 Persistence e AJAX. São Paulo. Ciência Moderna Editora, 2007.
  119. NIEDERAUER, Juliano. Integrando PHP 5 com MySQL. São Paulo. Novatec Editora Ltda, 2005.
  120. The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. AUTHORS PROFILE Geraldo Cesar Cantelli Mobile phone: 55(14) 996795734
  121. E-mail: geraldocesar.77@uol.com.br Academic Training Post Graduate (Lato sensu ) Specialization: Security in Computer Networks Institution: FATEC Ourinhos, São Paulo, Brazil (Centro Estadual de Educação Tecnológica Paula Souza) Graduation: Faculdade de Tecnologia de São Paulo (Centro Estadual de Educação Tecnológica Paula Souza) Course: Data Processing Tecnology Emphasis: Analysis and Systems Projects Specialization (Licenciature) Course: Special Program for Teacher Pedagogical Training for Curriculum Courses in High School Professional Education Instituto: Centro Estadual de Educação Tecnológica Paula Souza (Centro Estadual de Educação Tecnológica Paula Souza) Oracle Academy Instructor of Java Fundamentals Teacher course. My edited Book: Title "Java: An approach to Java Programming ", by Editora Viena. Web link: https://www.lojaviena.com.br/produto/java-uma-abordagem-sobre- programacao-java/ LinkedIn: br.linkedin.com/pub/geraldo-cesar-cantelli/2a/1b3/aa7/pt 48 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 VII. REFERENCES
  122. Joaquin A. Blaya, Hamish S.F. Fraser and Brian Holt, "" E-health technologies show promise in developing countries"," Health Afairs, Vols. 29, 2, pp. 244-251, 2010.
  123. OECD, ""Improving Health Sector Efficiency: The Role of Information and Communication Technologies"," 2010.
  124. WHO, "Ehealth Solutions in the African Region:Current Context and Persectives," 2010.
  125. WHO, "Resolutions and decisions," 2005.
  126. Funmi Adebesin, Paula Kotzé, Darelle van Greunen and Rosemary Foster, "Barriers and Challenges to the Adoption of E-Health Standards in Africa," 2013.
  127. Qamar Afaq Qureshi, Dr. Bahadar Shah,Dr. Najeebullah, Dr. Ghulam Muhammad Kundi,Dr. Allah Nawaz, Amanullah Khan Miankhel,Dr. Kamran Ahmad Chishti and Najam Afaq Qureshi, "Infrastructural Barriers to e-Health Implementation in Developing Countries:," European Journal of Sustainable Development, vol. 2, pp. 163-170, 2013.
  128. WHO, "Utilizing eHealth Solutions to Improve National Health Systems in the African Region," 2013.
  129. Lazaro S.P. Busagala, Geofrey C. Kawono, "Underlying Challenges of E-Health Adoption in Tanzania," International Journal of Information and Communication Technology Research, vol. 3, no. 1, 2013.
  130. Zanifa Omary et al., "Analysis of the Challenges Affecting E-healthcare Adoption in Developing Countries: A Case of Tanzania," International Journal of Information Studies, vol. 2, no. 1, pp. 38-50, 2010.
  131. MoHSW, "Tanzania National eHealth Strategy June, 2013 -July, 201 8," 2013.
  132. MoHSW, "Health Sector Strategic Plan III (July 2009 -June 2015 )- Tanzania," 2009.
  133. L. Nehemiah, "Towards EHR Interoperability in Tanzania Hospitals: Issues, Challenges and Opportunities," (IJCSEA), vol. 4, no. 4, 2014.
  134. F. T. Igira, "Empirical Experiences From the Health Information Systems in Tanzania," 2008.
  135. Daniel S. Kayange, and Erick A. Massawe, "The Potential For a Tanzania Wireless Telemedicine Network:An Overview," Research Journal in Engineering and Applied Sciences 2, pp. 171-175, 2013.
  136. Anne Mills, John E Ataguba, James Akazili, Jo Borghi, Bertha Garshong, Suzan Makawia, Gemini Mtei, Bronwyn Harris, Jane Macha, Filip Meheus,, "Equity in financing and use of health care in Ghana, South Africa, and Tanzania: implications for paths to universal coverage," The Lancet, pp. 126-133, 2012.
  137. N. B. o. Statistics., "Basic Facts and Figures, 2012 on Human Settlements in Tanzania Mainland," 2013.
  138. Vitalis Ndume et al., "A Framework for Enhancing e-Health Data Integration and Sharing in Distributed Environments," International Journal of Computing & ICT Research, vol. 8, no. 1, pp. 10-21, 2014.
  139. IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 53 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  140. Aspden, Philip Corrigan, Janet M Wolcott, Julie Erickson, Shari M, "Patient safety: achieving a new standard for care," National Academies Press, 2004.
  141. Nathanael Sirili , Angwara Kiwara, Daud Simba, "Challenges Towards Realization of Health Care Sector Goals of Tanzania Development Vision 2025: Training and Deployment of Graduate Human Resource for Health," East African journal of public health, vol. 9, no. 2, pp. 476- 486, 2013. AUTHORS PROFILE Alfred kajirunga, is a Master's student at the Nelson Mandela African Institution of Science and Technology. He is pursuing a master's degree in Communication Science and Technology. He currently lives in Tanzania Khamisi Kalegele is a lecture at Nelson Mandela African Institution of Science and Technology school of Computational and Communication Sciences and Engineering (CoCSE). He currently lives in Tanzania.
  142. IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 54 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  143. COMPARISON (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 57 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  144. Jyoti Bharti, M. K. Gupta, "Gait Recognition with Geometric Characteristic and Fuzzy Logic", Canadian Journal on Image Processing and Computer Vision Vol. 3
  145. Xuelong Li, Stephen J. Maybank,Shuicheng Yan, Dacheng Ta, and Dong Xu,"Gait Components and Their Application to Gender Recognition", IEEE Transactions on Systems, Man, and Cybernetics, Part C Applications and Reviews, vol. 38, no. 2, March 2008.
  146. D.M.Gavrila, The visual analysis of human movement: a survey, Computer Vision and Image Understanding, Vol. 73, no.1, January, pp.82-98, 1999.
  147. AI-Hua Wang, ji-Wei Liu, A gait recognition method based on positioning human body joints, proceedings of the 2007 international conference on wavelet analysis and pattern recognition, Beijing, China, 2-4 Nov, 2007.
  148. Arun Kumar Jhapate, Jasvinder Pal Singh, Gait Based Human Recognition System using Single Triangle IJCST (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 58 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  149. Rick Briggs, -Knowledge representation in Sanskrit and Artificial Intelligence,‖ AI Magazine, vol. 6, No.1, 1985.
  150. Rama N. and Meenakshi Lakshmanan, -A Computational Algorithm for Metrical Classification of Verse,‖ International Journal of Computer Science Issues, vol.7, Issue 2, No.4, March 2010.
  151. Aasish Pappu and Ratna Sanyal, -Vaakkriti: Sanskrit Tokenizer,‖ Indian Institute of Information Technology, Allahabad (U.P.), India, IJCNLP, 2008, pp. 577-582.
  152. Pawan Goyal, Vipul Arora, Laxmidhar Behera -ANALYSIS OF SANSKRIT TEXT: PARSING AND SEMANTIC RELATIONS,‖ Electrical Engineering, IIT Kanpur, India, Sanskrit Computational Linguistics, First and Second International symposia, France, October 2007.
  153. Rama N. and Meenakshi Lakshmanan, -A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit Poetry‖, International Journal of Computer Science Issues,vol.7,Issue 2,No.4,March 2010, pp. 056-062.
  154. P. Ramanujan -A Case of Sanskrit as a Programming Language,‖ 24th Annual Convention of Computer Society of India, Bangalore, 1989.
  155. G.Huet, -Lexicon-directed Segmentation and Tagging of Sanskrit,‖ XII Th World Sanskrit Conference, Helsinki, Finland, Aug 2003, pp. 305- 322.
  156. Girish Nath Jha, Muktanand Agrawal, Subash, Sudhir K. Mishra, Diwakar Mani, Diwakar Mishra, Manji Bhadra, Surjit K. Singh -Inflectional Morphology Analyzer for Sanskrit,‖ First International Sanskrit Computational Linguistics Symposium, October 2007.
  157. Subhash Kak, -Indian binary numbers and the Katyapadi notation‖, Annals of the Bhandarkar Oriental Research Institute, vol. 81, 2000, pp. 269-272.
  158. Amba Kulkarni, Department of Sanskrit StudiesUniversity of Hyderabad. -Sanskrit and Computational Linguistics"Akshar Bharati, Hyderabad 30th Oct 2007.
  159. P. Ramanujan , -A scheme for knowledge representation in Samskritam,‖ Abinava Vidya Bharathi, U.S.A, awards in AI & Sanskrit, 1990.
  160. Venkata Subba Reddy P., -Fuzzy Modeling and Natural Language Processing for Panini's Sanskrit Grammar‖, Journal Of Computer Science And Engineering, Volume 1, Issue 1, May 2010.
  161. Anoop M. Namboodiri, P.J Narayanan and C.V. Jawahar, International Institute of Information Technology, Hyderabad, India. -On Using Classical Poetry Structure for Indian Language Post-Processing‖, ICDAR 2007, Ninth International Conference.
  162. Strotranjali, Dr. Ravindra Ambadas Mule, Sangamner Mahavidyalaya, 9
  163. Dec.2007. REFERENCES
  164. Rachmansyah, Antonius Irianto, and A. Benny Mutiar "Designing andfManufacturing Microstrip Antenna for Wireless Communication at 2.4 GHz", IJCEE, Vol. 3, No. 5, pp. 33, October 2011.
  165. Indrasen Singh, Dr. V.S. Tripathi, "Micro strip Patch Antenna and its Applications:a Survey," IJCTA, vol 2(5), pp.1597-1598, Sept-Oct 2011.
  166. Magali Vaissiere, "Satellite frequency bands," 17 November 2014. http://www.esa.int/Our_Activities/ Telecommunications _Integrated_Applications/Satellite_frequency_bands
  167. Zewdu Hailu "Comparative Study on Bandwidth enhancement Techniques of microstrip Patch Antenna" Addis Ababa University, pp. 20-25, January 2008.
  168. Prof. Dr. Sandro M. Radicella, Prof. Dr. Ryszard Struzak, and Prof. Dr. Ryszard Struzak, "Radio Laboratory Handbook " , pp. 64, Italy, 2004. REFERENCES
  169. S. Umakanta, S. D. Kalyan, "Image Encryption & Authentication Using Orthogonal Transformation on Residual Number System". Being a project report submitted in the partial fulfillment of the requirements for the award of the degree of Bachelor of Technology at National Institute of Technology Rourkela, India, 2010. Available: www.ethesis.nitrkl.ac.in
  170. C. G. Rafael, E. W. Richard, "Digital Image Processing", Third Edition, Pearson Prentice Hall, New Jersey, 2008, Pp. 1-2. Available: www.prenhall.com/gonzalezwoods
  171. A. Lini, D. Neenu, "Secure Image Encryption Algorithms": A Review. International Journal of Scientific & Technology Research Volume 2, Issue 4, 2013, p. 187. Available: http://www.ijstr.org/final-print/apr2013
  172. F. Tim, "Image Encryption With Graphics Software", 2010. Available: http://www.lunatim.com/oddsends/
  173. J. C. Ingemar, L. M. Matthew, A. B. Jeffrey, F. Jessica, T. Kalker, "Digital Watermarking and Steganography 2 nd Edition, Elsevier Inc, 2008. Available: http://www.sciencedirect.com/science/book/
  174. B. Upendra, G. Shubhashish, "Analysis and Implementation of Selective Image Encryption Technique Using Matlab", IOSR Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 3, Ver. III, 2014
  175. P. Tom, "Properties of Matrices", Lecture Notes on Matrices and Operations, 2015. Available: www.tomzap.com/notes.
  176. E. W Weisstein,. "Transpose --from Wolfram MathWorld", 2004. Available:http://mathworld.wolfram.com/ REFERENCES
  177. A.G. Sutcliffe, M. Ennis and S.J. Watkinson, "Empirical studies of end-user information searching", Journal of the American Society for Information Science 51(13), 1211-1231, 2000
  178. H. Knoche, and J. Huang, "Text is not the enemy -How illiterates use their mobile phones", NUIs for New Worlds: New Interaction Forms and Interfaces for Mobile Applications in Developing Countries - CHI'2012 workshop, 2012.
  179. H. Shakeel, and M. L. Best, "Community Knowledge Sharing: An internet application to support communications across literacy levels", Technology and Society (ISTAS'02) International Symposium on, pp. 37-44, 2002.
  180. I. Medhi, A. Prasad, and K. Toyama, "Optimal audiovisual representations for illiterate users of computers", Proceedings of the 16th international conference on World Wide Web, pp. 882, 2007.
  181. I. Medhi, A. Sagar, and K. Toyama, "Text-free user interfaces for illiterate and semiliterate users", Information Technologies and International Development, vol. 4, issue 1, pp. 37-50, 2007.
  182. I. Medhi, S. N. Gautama, and K. Toyama, "A comparison of mobile money-transfer UIs for nonliterate and semi-literate users", Proceedings of the 27 th international conference on Human factors in computing systems, pp. 1741-1750, 2009.
  183. I. Medhi, S. Patnaik, E. Brunskill, S. N. N. Gautama, W. Thies, and K. Toyama, "Designing mobile interfaces for novice and low-literacy users", ACM Trans. Comput.-Hum. Interact., Vol. 18, issue 1, pp. 2:1-2:28, 2011.
  184. J. Chipchase, "Understanding non-literacy as a barrier to mobile phone communication", Retrieved at September, 2009 from: http://research.nokia.com/bluesky/nonliteracy-001-2005/index.html.
  185. M. El-Seoud, A. Karkar, J.M.A. Ja'am, and O.H. Karam, "A pictorial mobile-based communication application for non-verbal people with autism", 17 th International Conference on Interactive Collaborative Learning (ICL2014) and 43 nd International Conference on Engineering Pedagogy, Dubai, UAE, December 3 rd -6 th , ISBN: 978- 1-4799-4438-5/14, ©2014 IEEE, 529-534, 2014.
  186. M. S. Abou El-Seoud, A. Nosseir, I Taj-Eddin, H. El-Sofany, and N. Abu Rumman, "A Proposed Pedagogical Mobile Application for Learning Sign Language", International Journal of Interactive Mobile Technologies (iJIM), vol. 7, issue 1, pp. 46-55, ISSN-(1865-7923). January 2013, Doi:10.3991/ijim.v7i1.2387.
  187. M. S. Abou El-Seoud, I. A. T. F. Taj-Eddin, A. Nosseir, H. F. El- Sofany, and N. Abu Rumman, "Using Handheld Mobile System for Learning Sign Language", 15 th International Conference on Interactive Collaborative Learning (ICL2012) and 41 st International Conference on Engineering Pedagogy, September 26 th -28 th , Villach, Austria, 2012. [IEEE Catalog Number: CFP1223R-USB, ISBN:978- 1-4673-2426-7].
  188. M. Samir Abou El-Seoud, Islam A.T.F. Taj-Eddin, Ann Nosseir, "Using Handheld Mobile System for Teaching Illiterates", 17 th International Conference on Interactive Collaborative Learning (ICL2014) and 43 nd International Conference on Engineering Pedagogy, Dubai, UAE, December 3 rd -6 th , ISBN: 978-1-4799-4438- 5/14, ©2014 IEEE, 446-449, 2014.
  189. S. Wiedenbeck, "The use of icons and labels in an end user application program: an empirical study of learning and retention", Behavior & Information Technology, vol. 18, issue 2, pp. 68-82, 1999.
  190. UNESCO. Gender and Education for All: The Leap to equality. 2003. Retrieved from: http://www.unesco.org/new/en/education/themes/leading-the- international-agenda/efareport/reports/20034-gender/.
  191. Z. Lalji, and J. Good, "Designing new technologies for illiterate populations: A study in mobile phone interface design", Interacting with Computers, vol. 20, issue 6, pp. 574-586, 2008. 84 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  192. S. A. Husain, AsmaSajjad, Fareeha Anwar "Online Urdu Character Recognition System" MVA2007 IAPR Conference on Machine Vision Applications, May 16-18, 2007, Tokyo, JAPAN
  193. Tabassam Nawaz, Syed Ammar Hassan Shah Naqvi, HabiburRehman&AnoshiaFaiz"Optical Character Recognition System for Urdu (Naskh Font) Using Pattern Matching Technique International Journal of Image Processing," IJIP)Volume (3) : Issue (3) 92
  194. Muhammad Shafi, Faisal Iqbal, Iftikhar Ahmed Khan, Muhammad IrfanKhattak, Mohammad Saleem, Naeem Khan "Framework for Word Spotting In Scanned Urdu Documents by Exploiting the Dot Orientation" Life Science Journal 2013;
  195. Adnan Ul-Hasan , Syed SaqibBukhari , Faisal Shafaity, and Thomas M. Breuel"OCR-Free Table of Contents Detection in Urdu Books"German Research Center for Artificial Intelligence (DFKI),Kaiseralutern, Germany.
  196. Gurpreet Singh Lehal"Choice of Recognizable Units for Urdu OCR"
  197. PrakashChoudhary, Neeta Nain "An Annotated Urdu Corpus of Handwritten Text Image and Benchmarking of Corpus"MIPRO 2014/CIS
  198. Imtiyaz Ahmed Ansari, Dr. R. Y. Borse "Automatic Recognition of Offline Handwritten Urdu Digits In Unconstrained Environment Using DaubechiesWaveletTransforms"IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p- ISSN: 2278-8719 Vol. 3, Issue 9 (September. 2013), ||V2|| PP 50-56
  199. SaeedaNaz, Khizar Hayat, Muhammad Imran Razzak, Muhammad WaqasAnwar,Sajjad A. Madani, Samee U. Khan "The optical character recognition of Urdu-like cursive scripts"
  200. Faryal Jahangir, Waqas Anwar, UsamaIjazBajwa, Xuan Wang "N- gram and Gazetteer List Based Named Entity Recogn itionfor Urdu: A Scarce Resourced Language"
  201. Muhammad Imran Razzak, S.A.Hussain, A. Belaid and Muhammad Sher"Multi-font Numerals Recognition for Urdu Script based Languages" (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 88 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  202. Sobia Tariq Javed, SarmadHussain"Segmentation Based Urdu Nastalique OCR"
  203. Khalil Khan, Muhammad Siddique , Muhammad Aamir&RehanullahKhan "An Efficient Method for Urdu Language Text Search in Image Based Urdu Text"IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, March 2012 ISSN (Online): 1694-0814
  204. Muhammad Imran Razzak, Syed AfaqHussain, Muhammad Sher, ZeeshanShafiKhan"Combining Offline and Online Preprocessing for Online Urdu Character Recognition"Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol I IMECS 2009, March 18 -20, 2009, Hong Kong
  205. Faisal Shafait, Adnan-ul-Hasan, Daniel Keysers, and Thomas M. Breuel"Layout Analysis of Urdu Document Images"
  206. SaeedaNaz, Arif Iqbal Umar, Syed HamadShirazi, Sajjad Ahmad Khan,Imtiaz Ahmed and Akbar Ali Khan "Challenges of Urdu Named Entity Recognition: A Scarce Resourced Language" Research Journal of Applied Sciences, Engineering and Technology 8(10): 1272-1278, 2014 ISSN: 2040-7459; e-ISSN: 2040-7467 REFERENCES
  207. K. Chen and W. M. Zheng, "Cloud Computing: System instance and Current State," Journal of Software, Vol. 20, No. 5, 2009, pp. 1337-1348. doi:10.3724/SP.J.1001.2009.03
  208. Z. W. Xu, H. M. Liao, et al., "The Classification research of Network Computing System," Journal of Computing Machine, Vol. 18, No. 9, 2008, pp. 1509-1515.
  209. G. W. Zhang, R. He and Y. Liu, "The Evolution based on Cloud Model," Journal of Computing Machine, Vol. 7, 2008, pp. 1233-1239.
  210. D. Breitgand and A. Epstein. Sla-aware placement of multivirtual machine elastic services in compute clouds. In Integrated Network Management (IM), '11 IFIP/IEEE International Symposium on, pages 161-168, 2011.
  211. Xiaoqiao Meng, Canturk Isci, Jeffrey Kephart, Li Zhang, Eric Bouillet, and Dimitrios Pendarakis. Efficient resource provisioning in compute clouds via vm multiplexing. In Proceeding of the 7th international conference on Autonomic computing, pages 11-20, New York, NY, USA, 2010
  212. Hewlett Packard Web Site, Introducing Integrity Virtual Machines white paper, http://docs.hp.com/en/9987/Intro VM
  213. VMWareWeb Site, Server Consolidation and Containment Solutions Brief, http://www.vmware.com/pdf/server consolidation.pdf
  214. Norman Bobroff, Andrzej Kochut, Kirk Beaty Dynamic Placement of Virtual Machines for Managing SLA Violations
  215. Sindelar, M., Sitaraman, R.K., Shenoy, P.: Sharing- Aware Algorithms for Virtual Machine Colocation. In: Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures. San Jose, California, USA (June 2011)
  216. Xu, J., Fortes, J.A.B.: Multi-Objective Virtual Machine Placement in Virtualized Data Center Environments. In: Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing. Hangshou, PR of China (Dec 2010)
  217. Singh, A., Korupolu, M., Mohapatra, D.: Server- Storage Virtualization: Integration and Load Balancing in Data Centers. In: Proc. of the 2008 ACM/IEEE conference on Supercomputing (SC'08). pp. 53:1-53:12. Austin, TX (2008)
  218. Meng, X., Pappas, V., Zhang, L.: Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement. In: Proceedings of IEEE INFOCOM. San Diego, CA, USA (March 2010)
  219. Kumar, S., Talwar, V., Kumar, V., Ranganathan, P., Schwan, K.: vManage: Loosely Coupled Platform and Virtualization Management in Data Centers. In: Proceedings of the 6th international conference on Autonomic computing. pp. 127-136. ACM, Barcelona, Spain (June 2009)
  220. Wood, T., Shenoy, P., Venkataramani, A., Yousif, M.: Black-box and Gray-box Strategies for Virtual Machine Migration. In: Proc of the 4th USENIX Symposium on Networked Systems Design and Implementation. Cambridge, MA (2007)
  221. Bobroff, N., Kochut, A., Beaty, K.: Dynamic Placement of Virtual Machines for Managing SLA Violations. In: Proc of the 10th IFIP/IEEE International Symposium on Integrated Network Management. Munich, Germany (May 2007)
  222. T. Wood et. al., Black-box and gray-box strategies for virtual machine migration, proceedings of Symp. on Networked Systems Design and Implementation (NSDI), 2007
  223. H. Zheng, L. Zhou, J. Wu, Design and implementation of load balancing in web server cluster system, Journal of Nanjing University of Aeronautics & Astronautics, Vol. 38, No. 3, Jun. 2006
  224. A. Singh, M. Korupolu, D. Mohapatra, Server-storage virtualization: Integration and load balancing in data centers, Proceedings of the 2008 ACM/IEEE Conference on Supercomputing, 2008, 1-12
  225. E. Arzuaga, D. R. Kaeli, Quantifying load imbalance on virtualized enterprise servers, Proceedings of WOSP/SIPEW'10, San Jose, California, USA, January 28- 30, 2010
  226. W. Tian, C. Jing, J. Hu, Analysis of resource allocation and scheduling policies in cloud datacenter, Proceedings of the IEEE 3rd International Conference on Networks Security Wireless Communications and Trusted Computing, March 2011 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 101 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  227. T.Thiruvenkadam and Dr.V.Karthikeyani, An approach to virtual machine placement problem in a datacenter environment based on overloaded resource, International Journal of Computer Science and Mobile Computing, Vol.3
  228. T.Thiruvenkadam and Dr.V.Karthikeyani, A Comparative study of VM Placement Algorithms in Cloud Computing Environment, In proccedings of 07 th SARC-IRF International Conference,August 2014,India.
  229. Guo G., Ting-Iei H., Shuai G., " Genetic Simulated Annealing Algorithm for Task Scheduling based on Cloud Computing Environment", IEEE International Conference on Intelligent Computing and Integrated Systems (ICISS), 2010, Guilin, pp. 60-63, 2010.
  230. Wilcox, D.,McNabb, A., Seppi, K.: Solving virtual machine packing with a reordering grouping genetic algorithm. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC), pp. 362-369 (2011).
  231. Tarun goyal & Aakanksha agrawal, "Host scheduling algorithm using genetic algorithm in cloud computing environment," International Journal of Research in Engineering & Technology (IJRET) Vol. 1, Issue 1, June 2013, 7-12.
  232. M. Srinivas, and L. M. Patnaik, Fellow, IEEE. Adaptive Probabilities of Crossover and Mutation in Genetic Algorithms. IEEE Transactions on Systems, Man and Cybernetics, Vol. 24, No. 4, April 1994.
  233. P. Rohlfshagen and J. Bullinaria. A Genetic Algorithm with Exon Shu_ing Crossover for Hard Bin Packing Problems. Proceedings of Genetic and Evolutionary Computation Conference, 9:1365{1371, 2007.
  234. T.Thiruvenkadam was born in Tiruchengode, Tamil Nadu (TN), India, in 1984. He received the REFERENCES
  235. Rashmi H. (2015). Biometrics Authentication Technique with Kerberos for Email Login. International Journal of Advances in Engineering and Technology.
  236. Michael E.W. and Herbert J.N. (2005), Principles of Information Security. Thomson course Technology Printed in Canada.
  237. Ruppinder S and Naringer R. (2014). Comparison of Various Biometric Methods. International Journal of Advances in Science and Technology Vol. 2 issue 1.
  238. Tiang X and Yau W. (2000). Fingerprint Minutiae Matching Based on the Local and Global Structures.
  239. th Int. Conf. Pattern Recognition Vol. 2 pp 1038- 1041.
  240. Keerthi P.P. Deepak R.G. Swathi K. and Rupali N. (2014). IOSR Journal of Computer Science Pp. 73-79.
  241. Vidya P and Aswathy R.S. (2014). Privacy Improvement for Fingerprint Recognition Based on RSA International Conference on Innovations and Advance (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13, No. 6, June 2015 116 http://sites.google.com/site/ijcsis/ ISSN 1947-5500
  242. Assoc. Prof. N. Jaisankar, VIT University, Vellore,Tamilnadu, India Dr. Amogh Kavimandan, The Mathworks Inc., USA Dr. Ramasamy Mariappan, Vinayaka Missions University, India Dr. Yong Li, School of Electronic and Information Engineering, Beijing Jiaotong University, P.R. China Assist. Prof. Sugam Sharma, NIET, India / Iowa State University, USA Dr.
  243. Jorge A. Ruiz-Vanoye, Universidad Autónoma del Estado de Morelos, Mexico Dr. Neeraj Kumar, SMVD University, Katra (J&K), India
  244. Dr Genge Bela, "Petru Maior" University of Targu Mures, Romania Dr. Junjie Peng, Shanghai University, P. R. China Dr. Ilhem LENGLIZ, HANA Group -CRISTAL Laboratory, Tunisia Prof. Dr. Durgesh Kumar Mishra, Acropolis Institute of Technology and Research, Indore, MP, India Dr. Jorge L. Hernández-Ardieta, University Carlos III of Madrid, Spain Prof. Dr.C.Suresh Gnana Dhas, Anna University, India Dr Li Fang, Nanyang Technological University, Singapore Prof. Pijush Biswas, RCC Institute of Information Technology, India Dr. Siddhivinayak Kulkarni, University of Ballarat, Ballarat, Victoria, Australia Dr. A. Arul Lawrence, Royal College of Engineering & Technology, India Dr. Wongyos Keardsri, Chulalongkorn University, Bangkok, Thailand Dr. Somesh Kumar Dewangan, CSVTU Bhilai (C.G.)/ Dimat Raipur, India Dr. Hayder N. Jasem, University Putra Malaysia, Malaysia Dr. A.V.Senthil Kumar, C. M. S. College of Science and Commerce, India Dr. R. S. Karthik, C. M. S. College of Science and Commerce, India Dr. P. Vasant, University Technology Petronas, Malaysia Dr. Wong Kok Seng, Soongsil University, Seoul, South Korea Dr. Praveen Ranjan Srivastava, BITS PILANI, India Dr. Kong Sang Kelvin, Leong, The Hong Kong Polytechnic University, Hong Kong Dr. Mohd Nazri Ismail, Universiti Kuala Lumpur, Malaysia Dr. Rami J. Matarneh, Al-isra Private University, Amman, Jordan Dr Ojesanmi Olusegun Ayodeji, Ajayi Crowther University, Oyo, Nigeria Dr. Riktesh Srivastava, Skyline University, UAE Dr.
  245. Oras F. Baker, UCSI University -Kuala Lumpur, Malaysia Dr. Ahmed S. Ghiduk, Faculty of Science, Beni-Suef University, Egypt and Department of Computer science, Taif University, Saudi Arabia Dr. Tirthankar Gayen, IIT Kharagpur, India Dr. Huei-Ru Tseng, National Chiao Tung University, Taiwan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  246. Prof. Ning Xu, Wuhan University of Technology, China Dr Mohammed Salem Binwahlan, Hadhramout University of Science and Technology, Yemen & Universiti Teknologi Malaysia, Malaysia.
  247. Dr. Aruna Ranganath, Bhoj Reddy Engineering College for Women, India Dr. Hafeezullah Amin, Institute of Information Technology, KUST, Kohat, Pakistan Prof. Syed S. Rizvi, University of Bridgeport, USA Dr. Shahbaz Pervez Chattha, University of Engineering and Technology Taxila, Pakistan Dr. Shishir Kumar, Jaypee University of Information Technology, Wakanaghat (HP), India Dr. Shahid Mumtaz, Portugal Telecommunication, Instituto de Telecomunicações (IT) , Aveiro, Portugal Dr. Rajesh K Shukla, Corporate Institute of Science & Technology Bhopal M P Dr. Poonam Garg, Institute of Management Technology, India Dr. S. Mehta, Inha University, Korea Dr. Dilip Kumar S.M, University Visvesvaraya College of Engineering (UVCE), Bangalore University, Bangalore Prof. Malik Sikander Hayat Khiyal, Fatima Jinnah Women University, Rawalpindi, Pakistan Dr. Virendra Gomase , Department of Bioinformatics, Padmashree Dr. D.Y. Patil University Dr. Irraivan Elamvazuthi, University Technology PETRONAS, Malaysia Dr. Saqib Saeed, University of Siegen, Germany Dr. Pavan Kumar Gorakavi, IPMA-USA [YC] Dr. Ahmed Nabih Zaki Rashed, Menoufia University, Egypt Prof. Shishir K. Shandilya, Rukmani Devi Institute of Science & Technology, India Dr. J. Komala Lakshmi, SNR Sons College, Computer Science, India Dr. Muhammad Sohail, KUST, Pakistan Dr. Manjaiah D.H, Mangalore University, India Dr. S Santhosh Baboo, D.G.Vaishnav College, Chennai, India Prof. Dr. Mokhtar Beldjehem, Sainte-Anne University, Halifax, NS, Canada Dr. Deepak Laxmi Narasimha, Faculty of Computer Science and Information Technology, University of Malaya, Malaysia Prof. Dr. Arunkumar Thangavelu, Vellore Institute Of Technology, India Dr. M. Azath, Anna University, India Dr. Md. Rabiul Islam, Rajshahi University of Engineering & Technology (RUET), Bangladesh Dr. Aos Alaa Zaidan Ansaef, Multimedia University, Malaysia
  248. Dr Suresh Jain, Professor (on leave), Institute of Engineering & Technology, Devi Ahilya University, Indore (MP) India, Dr.
  249. Mohammed M. Kadhum, Universiti Utara Malaysia Dr. Hanumanthappa. J. University of Mysore, India Dr. Syed Ishtiaque Ahmed, Bangladesh University of Engineering and Technology (BUET) Dr Akinola Solomon Olalekan, University of Ibadan, Ibadan, Nigeria Dr. Santosh K. Pandey, Department of Information Technology, The Institute of Chartered Accountants of India Dr. P. Vasant, Power Control Optimization, Malaysia Dr. Petr Ivankov, Automatika -S, Russian Federation (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  250. Dr. Utkarsh Seetha, Data Infosys Limited, India Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal Dr. (Mrs) Padmavathi Ganapathi, Avinashilingam University for Women, Coimbatore Assist. Prof. A. Neela madheswari, Anna university, India Prof. Ganesan Ramachandra Rao, PSG College of Arts and Science, India Mr. Kamanashis Biswas, Daffodil International University, Bangladesh Dr. Atul Gonsai, Saurashtra University, Gujarat, India Mr. Angkoon Phinyomark, Prince of Songkla University, Thailand Mrs. G. Nalini Priya, Anna University, Chennai Dr. P. Subashini, Avinashilingam University for Women, India Assoc. Prof. Vijay Kumar Chakka, Dhirubhai Ambani IICT, Gandhinagar ,Gujarat Mr Jitendra Agrawal, : Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal Mr. Vishal Goyal, Department of Computer Science, Punjabi University, India Dr. R. Baskaran, Department of Computer Science and Engineering, Anna University, Chennai Assist. Prof, Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India Dr. Jamal Ahmad Dargham, School of Engineering and Information Technology, Universiti Malaysia Sabah Mr. Nitin Bhatia, DAV College, India Dr. Dhavachelvan Ponnurangam, Pondicherry Central University, India Dr. Mohd Faizal Abdollah, University of Technical Malaysia, Malaysia Assist. Prof. Sonal Chawla, Panjab University, India Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India Mr. Arash Habibi Lashkari, University of Malaya (UM), Malaysia
  251. Mr. Md. Rajibul Islam, Ibnu Sina Institute, University Technology Malaysia Professor Dr. Sabu M. Thampi, .B.S Institute of Technology for Women, Kerala University, India Mr. Noor Muhammed Nayeem, Université Lumière Lyon 2, 69007 Lyon, France Dr. Himanshu Aggarwal, Department of Computer Engineering, Punjabi University, India Prof R. Naidoo, Dept of Mathematics/Center for Advanced Computer Modelling, Durban University of Technology, Durban,South Africa Prof. Mydhili K Nair, M S Ramaiah Institute of Technology(M.S.R.I.T), Affliliated to Visweswaraiah Technological University, Bangalore, India M. Prabu, Adhiyamaan College of Engineering/Anna University, India Mr. Swakkhar Shatabda, Department of Computer Science and Engineering, United International University, Bangladesh Dr. Abdur Rashid Khan, ICIT, Gomal University, Dera Ismail Khan, Pakistan Mr. H. Abdul Shabeer, I-Nautix Technologies,Chennai, India Dr.
  252. M. Aramudhan, Perunthalaivar Kamarajar Institute of Engineering and Technology, India Dr.
  253. M. P. Thapliyal, Department of Computer Science, HNB Garhwal University (Central University), India Dr. Shahaboddin Shamshirband, Islamic Azad University, Iran Mr. Zeashan Hameed Khan, : Université de Grenoble, France Prof. Anil K Ahlawat, Ajay Kumar Garg Engineering College, Ghaziabad, UP Technical University, Lucknow Mr. Longe Olumide Babatope, University Of Ibadan, Nigeria Associate Prof. Raman Maini, University College of Engineering, Punjabi University, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  254. Dr. Maslin Masrom, University Technology Malaysia, Malaysia Sudipta Chattopadhyay, Jadavpur University, Kolkata, India Dr. Dang Tuan NGUYEN, University of Information Technology, Vietnam National University -Ho Chi Minh City Dr. Mary Lourde R., BITS-PILANI Dubai , UAE Dr. Abdul Aziz, University of Central Punjab, Pakistan Mr.
  255. Karan Singh, Gautam Budtha University, India Mr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India Associate Prof Dr Zuraini Ismail, University Technology Malaysia, Malaysia Assistant Prof. Yasser M. Alginahi, College of Computer Science and Engineering, Taibah University, Madinah Munawwarrah, KSA Mr. Dakshina Ranjan Kisku, West Bengal University of Technology, India Mr. Raman Kumar, Dr B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India Associate Prof. Samir B. Patel, Institute of Technology, Nirma University, India Dr. M.Munir Ahamed Rabbani, B. S. Abdur Rahman University, India
  256. Asst. Prof. Koushik Majumder, West Bengal University of Technology, India Dr. Alex Pappachen James, Queensland Micro-nanotechnology center, Griffith University, Australia Assistant Prof. S. Hariharan, B.S. Abdur Rahman University, India Asst Prof. Jasmine. K. S, R.V.College of Engineering, India Mr Naushad Ali Mamode Khan, Ministry of Education and Human Resources, Mauritius Prof. Mahesh Goyani, G H Patel Collge of Engg. & Tech, V.V.N, Anand, Gujarat, India Dr. Mana Mohammed, University of Tlemcen, Algeria Prof. Jatinder Singh, Universal Institutiion of Engg. & Tech. CHD, India Mrs. M. Anandhavalli Gauthaman, Sikkim Manipal Institute of Technology, Majitar, East Sikkim Dr. Bin Guo, Institute Telecom SudParis, France Mrs. Maleika Mehr Nigar Mohamed Heenaye-Mamode Khan, University of Mauritius Prof. Pijush Biswas, RCC Institute of Information Technology, India Mr. V. Bala Dhandayuthapani, Mekelle University, Ethiopia Dr. Irfan Syamsuddin, State Polytechnic of Ujung Pandang, Indonesia Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius Mr. Ravi Chandiran, Zagro Singapore Pte Ltd. Singapore
  257. Mr. Milindkumar V. Sarode, Jawaharlal Darda Institute of Engineering and Technology, India Dr. Shamimul Qamar, KSJ Institute of Engineering & Technology, India Dr. C. Arun, Anna University, India Assist. Prof. M.N.Birje, Basaveshwar Engineering College, India Prof. Hamid Reza Naji, Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Assist. Prof. Debasis Giri, Department of Computer Science and Engineering, Haldia Institute of Technology Subhabrata Barman, Haldia Institute of Technology, West Bengal Mr. M. I. Lali, COMSATS Institute of Information Technology, Islamabad, Pakistan Dr. Feroz Khan, Central Institute of Medicinal and Aromatic Plants, Lucknow, India Mr. R. Nagendran, Institute of Technology, Coimbatore, Tamilnadu, India Mr. Amnach Khawne, King Mongkut's Institute of Technology Ladkrabang, Ladkrabang, Bangkok, Thailand (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  258. Dr. P. Chakrabarti, Sir Padampat Singhania University, Udaipur, India Mr. Nafiz Imtiaz Bin Hamid, Islamic University of Technology (IUT), Bangladesh. Shahab-A. Shamshirband, Islamic Azad University, Chalous, Iran Prof. B. Priestly Shan, Anna Univeristy, Tamilnadu, India
  259. Venkatramreddy Velma, Dept. of Bioinformatics, University of Mississippi Medical Center, Jackson MS USA Akshi Kumar, Dept. of Computer Engineering, Delhi Technological University, India Dr. Umesh Kumar Singh, Vikram University, Ujjain, India Mr. Serguei A. Mokhov, Concordia University, Canada Mr. Lai Khin Wee, Universiti Teknologi Malaysia, Malaysia Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India Mr. Syed R. Rizvi, Analytical Services & Materials, Inc., USA Dr. S. Karthik, SNS Collegeof Technology, India Mr. Syed Qasim Bukhari, CIMET (Universidad de Granada), Spain Mr. A.D.Potgantwar, Pune University, India Dr. Himanshu Aggarwal, Punjabi University, India Mr. Rajesh Ramachandran, Naipunya Institute of Management and Information Technology, India Dr. K.L. Shunmuganathan, R.M.K Engg College , Kavaraipettai ,Chennai Dr. Prasant Kumar Pattnaik, KIST, India.
  260. Dr. Ch. Aswani Kumar, VIT University, India Mr. Ijaz Ali Shoukat, King Saud University, Riyadh KSA Mr. Arun Kumar, Sir Padam Pat Singhania University, Udaipur, Rajasthan Mr. Muhammad Imran Khan, Universiti Teknologi PETRONAS, Malaysia Dr. Natarajan Meghanathan, Jackson State University, Jackson, MS, USA Mr. Mohd Zaki Bin Mas'ud, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia
  261. Prof. Dr. R. Geetharamani, Dept. of Computer Science and Eng., Rajalakshmi Engineering College, India Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India Dr. S. Abdul Khader Jilani, University of Tabuk, Tabuk, Saudi Arabia Mr. Syed Jamal Haider Zaidi, Bahria University, Pakistan Dr. N. Devarajan, Government College of Technology,Coimbatore, Tamilnadu, INDIA Mr. R. Jagadeesh Kannan, RMK Engineering College, India Mr. Deo Prakash, Shri Mata Vaishno Devi University, India Mr. Mohammad Abu Naser, Dept. of EEE, IUT, Gazipur, Bangladesh Assist. Prof. Prasun Ghosal, Bengal Engineering and Science University, India Mr. Md. Golam Kaosar, School of Engineering and Science, Victoria University, Melbourne City, Australia Mr. R. Mahammad Shafi, Madanapalle Institute of Technology & Science, India Dr. F.Sagayaraj Francis, Pondicherry Engineering College,India Dr. Ajay Goel, HIET , Kaithal, India Mr. Nayak Sunil Kashibarao, Bahirji Smarak Mahavidyalaya, India Mr. Suhas J Manangi, Microsoft India Dr.
  262. Kalyankar N. V., Yeshwant Mahavidyalaya, Nanded , India Dr. K.D. Verma, S.V. College of Post graduate studies & Research, India Dr. Amjad Rehman, University Technology Malaysia, Malaysia (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  263. Mr. Rachit Garg, L K College, Jalandhar, Punjab Mr. J. William, M.A.M college of Engineering, Trichy, Tamilnadu,India Prof. Jue-Sam Chou, Nanhua University, College of Science and Technology, Taiwan Dr. Thorat S.B., Institute of Technology and Management, India Mr. Ajay Prasad, Sir Padampat Singhania University, Udaipur, India Dr. Kamaljit I. Lakhtaria, Atmiya Institute of Technology & Science, India Mr. Syed Rafiul Hussain, Ahsanullah University of Science and Bangladesh Mrs Fazeela Tunnisa, Najran University, Kingdom of Saudi Arabia Mrs Kavita Taneja, Maharishi Markandeshwar University, Haryana, India Mr. Maniyar Shiraz Ahmed, Najran University, Najran, KSA Mr. Anand Kumar, AMC Engineering College, Bangalore Dr. Rakesh Chandra Gangwar, Beant College of Engg. & Tech., Gurdaspur (Punjab) India Dr.
  264. V V Rama Prasad, Sree Vidyanikethan Engineering College, India
  265. Assist. Prof. Neetesh Kumar Gupta, Technocrats Institute of Technology, Bhopal (M.P.), India Mr.
  266. Ashish Seth, Uttar Pradesh Technical University, Lucknow ,UP India Dr.
  267. V V S S S Balaram, Sreenidhi Institute of Science and Technology, India Mr Rahul Bhatia, Lingaya's Institute of Management and Technology, India Prof. Niranjan Reddy. P, KITS , Warangal, India Prof. Rakesh. Lingappa, Vijetha Institute of Technology, Bangalore, India Dr. Mohammed Ali Hussain, Nimra College of Engineering & Technology, Vijayawada, A.P., India Dr. A.Srinivasan, MNM Jain Engineering College, Rajiv Gandhi Salai, Thorapakkam, Chennai Mr. Rakesh Kumar, M.M. University, Mullana, Ambala, India Dr. Lena Khaled, Zarqa Private University, Aman, Jordon Ms. Supriya Kapoor, Patni/Lingaya's Institute of Management and Tech., India Dr. Tossapon Boongoen , Aberystwyth University, UK Dr . Bilal Alatas, Firat University, Turkey Assist. Prof. Jyoti Praaksh Singh , Academy of Technology, India Dr. Ritu Soni, GNG College, India Dr . Mahendra Kumar , Sagar Institute of Research & Technology, Bhopal, India.
  268. Dr. Binod Kumar, Lakshmi Narayan College of Tech.(LNCT)Bhopal India Dr. Muzhir Shaban Al-Ani, Amman Arab University Amman -Jordan Dr. T.C. Manjunath , ATRIA Institute of Tech, India Mr. Muhammad Zakarya, COMSATS Institute of Information Technology (CIIT), Pakistan Assist. Prof. Harmunish Taneja, M. M. University, India Dr. Chitra Dhawale , SICSR, Model Colony, Pune, India Mrs Sankari Muthukaruppan, Nehru Institute of Engineering and Technology, Anna University, India Mr. Aaqif Afzaal Abbasi, National University Of Sciences And Technology, Islamabad Prof. Ashutosh Kumar Dubey, Trinity Institute of Technology and Research Bhopal, India Mr. G. Appasami, Dr. Pauls Engineering College, India Mr. M Yasin, National University of Science and Tech, karachi (NUST), Pakistan Mr. Yaser Miaji, University Utara Malaysia, Malaysia Mr. Shah Ahsanul Haque, International Islamic University Chittagong (IIUC), Bangladesh (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  269. Prof. (Dr) Syed Abdul Sattar, Royal Institute of Technology & Science, India Dr. S. Sasikumar, Roever Engineering College Assist. Prof. Monit Kapoor, Maharishi Markandeshwar University, India Mr. Nwaocha Vivian O, National Open University of Nigeria Dr.
  270. M. S. Vijaya, GR Govindarajulu School of Applied Computer Technology, India Assist. Prof. Chakresh Kumar, Manav Rachna International University, India Mr. Kunal Chadha , R&D Software Engineer, Gemalto, Singapore Mr. Mueen Uddin, Universiti Teknologi Malaysia, UTM , Malaysia Dr. Dhuha Basheer abdullah, Mosul university, Iraq Mr. S. Audithan, Annamalai University, India Prof. Vijay K Chaudhari, Technocrats Institute of Technology , India Associate Prof. Mohd Ilyas Khan, Technocrats Institute of Technology , India Dr. Vu Thanh Nguyen, University of Information Technology, HoChiMinh City, VietNam Assist. Prof. Anand Sharma, MITS, Lakshmangarh, Sikar, Rajasthan, India Prof.
  271. T V Narayana Rao, HITAM Engineering college, Hyderabad Mr. Deepak Gour, Sir Padampat Singhania University, India Assist. Prof. Amutharaj Joyson, Kalasalingam University, India Mr. Ali Balador, Islamic Azad University, Iran Mr. Mohit Jain, Maharaja Surajmal Institute of Technology, India Mr. Dilip Kumar Sharma, GLA Institute of Technology & Management, India Dr. Debojyoti Mitra, Sir padampat Singhania University, India Dr. Ali Dehghantanha, Asia-Pacific University College of Technology and Innovation, Malaysia Mr. Zhao Zhang, City University of Hong Kong, China Prof.
  272. S.P. Setty, A.U. College of Engineering, India Prof. Patel Rakeshkumar Kantilal, Sankalchand Patel College of Engineering, India Mr. Biswajit Bhowmik, Bengal College of Engineering & Technology, India Mr. Manoj Gupta, Apex Institute of Engineering & Technology, India Assist. Prof. Ajay Sharma, Raj Kumar Goel Institute Of Technology, India Assist. Prof. Ramveer Singh, Raj Kumar Goel Institute of Technology, India Dr. Hanan Elazhary, Electronics Research Institute, Egypt Dr. Hosam I. Faiq, USM, Malaysia Prof. Dipti D. Patil, MAEER's MIT College of Engg. & Tech, Pune, India Assist. Prof. Devendra Chack, BCT Kumaon engineering College Dwarahat Almora, India Prof. Manpreet Singh, M. M. Engg. College, M. M. University, India Assist. Prof. M. Sadiq ali Khan, University of Karachi, Pakistan Mr. Prasad S. Halgaonkar, MIT -College of Engineering, Pune, India Dr. Imran Ghani, Universiti Teknologi Malaysia, Malaysia Prof. Varun Kumar Kakar, Kumaon Engineering College, Dwarahat, India Assist. Prof. Nisheeth Joshi, Apaji Institute, Banasthali University, Rajasthan, India Associate Prof. Kunwar S. Vaisla, VCT Kumaon Engineering College, India Prof Anupam Choudhary, Bhilai School Of Engg.,Bhilai (C.G.),India Mr. Divya Prakash Shrivastava, Al Jabal Al garbi University, Zawya, Libya (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  273. Associate Prof. Dr. V. Radha, Avinashilingam Deemed university for women, Coimbatore. Dr. Kasarapu Ramani, JNT University, Anantapur, India Dr. Anuraag Awasthi, Jayoti Vidyapeeth Womens University, India Dr.
  274. C G Ravichandran, R V S College of Engineering and Technology, India Dr. Mohamed A. Deriche, King Fahd University of Petroleum and Minerals, Saudi Arabia Mr. Abbas Karimi, Universiti Putra Malaysia, Malaysia Mr. Amit Kumar, Jaypee University of Engg. and Tech., India Dr. Nikolai Stoianov, Defense Institute, Bulgaria Assist. Prof. S. Ranichandra, KSR College of Arts and Science, Tiruchencode Mr. T.K.P. Rajagopal, Diamond Horse International Pvt Ltd, India Dr. Md. Ekramul Hamid, Rajshahi University, Bangladesh Mr. Hemanta Kumar Kalita , TATA Consultancy Services (TCS), India Dr. Messaouda Azzouzi, Ziane Achour University of Djelfa, Algeria Prof. (Dr.) Juan Jose Martinez Castillo, "Gran Mariscal de Ayacucho" University and Acantelys research Group, Venezuela Dr. Jatinderkumar R. Saini, Narmada College of Computer Application, India Dr. Babak Bashari Rad, University Technology of Malaysia, Malaysia Dr. Nighat Mir, Effat University, Saudi Arabia Prof. (Dr.) G.M.Nasira, Sasurie College of Engineering, India Mr. Varun Mittal, Gemalto Pte Ltd, Singapore Assist. Prof. Mrs P. Banumathi, Kathir College Of Engineering, Coimbatore Assist. Prof. Quan Yuan, University of Wisconsin-Stevens Point, US Dr. Pranam Paul, Narula Institute of Technology, Agarpara, West Bengal, India Assist. Prof. J. Ramkumar, V.L.B Janakiammal college of Arts & Science, India Mr. P. Sivakumar, Anna university, Chennai, India Mr. Md. Humayun Kabir Biswas, King Khalid University, Kingdom of Saudi Arabia Mr. Mayank Singh, J.P. Institute of Engg & Technology, Meerut, India HJ. Kamaruzaman Jusoff, Universiti Putra Malaysia Mr. Nikhil Patrick Lobo, CADES, India Dr. Amit Wason, Rayat-Bahra Institute of Engineering & Boi-Technology, India Dr. Rajesh Shrivastava, Govt. Benazir Science & Commerce College, Bhopal, India Assist. Prof. Vishal Bharti, DCE, Gurgaon Mrs. Sunita Bansal, Birla Institute of Technology & Science, India Dr. R. Sudhakar, Dr.Mahalingam college of Engineering and Technology, India Dr. Amit Kumar Garg, Shri Mata Vaishno Devi University, Katra(J&K), India
  275. Assist. Prof. Raj Gaurang Tiwari, AZAD Institute of Engineering and Technology, India Mr. Hamed Taherdoost, Tehran, Iran Mr. Amin Daneshmand Malayeri, YRC, IAU, Malayer Branch, Iran Mr. Shantanu Pal, University of Calcutta, India Dr. Terry H. Walcott, E-Promag Consultancy Group, United Kingdom Dr. Ezekiel U OKIKE, University of Ibadan, Nigeria Mr. P. Mahalingam, Caledonian College of Engineering, Oman (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  276. Dr. Mahmoud M. A. Abd Ellatif, Mansoura University, Egypt Prof. Kunwar S. Vaisla, BCT Kumaon Engineering College, India Prof. Mahesh H. Panchal, Kalol Institute of Technology & Research Centre, India Mr. Muhammad Asad, Technical University of Munich, Germany Mr. AliReza Shams Shafigh, Azad Islamic university, Iran Prof. S. V. Nagaraj, RMK Engineering College, India Mr.
  277. Ashikali M Hasan, Senior Researcher, CelNet security, India Dr. Adnan Shahid Khan, University Technology Malaysia, Malaysia Mr. Prakash Gajanan Burade, Nagpur University/ITM college of engg, Nagpur, India Dr. Jagdish B.Helonde, Nagpur University/ITM college of engg, Nagpur, India Professor, Doctor BOUHORMA Mohammed, Univertsity Abdelmalek Essaadi, Morocco Mr. K. Thirumalaivasan, Pondicherry Engg. College, India Mr. Umbarkar Anantkumar Janardan, Walchand College of Engineering, India Mr.
  278. Ashish Chaurasia, Gyan Ganga Institute of Technology & Sciences, India Mr. Sunil Taneja, Kurukshetra University, India Mr. Fauzi Adi Rafrastara, Dian Nuswantoro University, Indonesia Dr. Yaduvir Singh, Thapar University, India Dr. Ioannis V. Koskosas, University of Western Macedonia, Greece Dr. Vasantha Kalyani David, Avinashilingam University for women, Coimbatore Dr. Ahmed Mansour Manasrah, Universiti Sains Malaysia, Malaysia Miss. Nazanin Sadat Kazazi, University Technology Malaysia, Malaysia Mr. Saeed Rasouli Heikalabad, Islamic Azad University -Tabriz Branch, Iran Assoc. Prof. Dhirendra Mishra, SVKM's NMIMS University, India Prof. Shapoor Zarei, UAE Inventors Association, UAE Prof. B.Raja Sarath Kumar, Lenora College of Engineering, India Dr. Bashir Alam, Jamia millia Islamia, Delhi, India Prof. Anant J Umbarkar, Walchand College of Engg., India Assist. Prof. B. Bharathi, Sathyabama University, India Dr. Fokrul Alom Mazarbhuiya, King Khalid University, Saudi Arabia Prof. T.S.Jeyali Laseeth, Anna University of Technology, Tirunelveli, India Dr.
  279. M. Balraju, Jawahar Lal Nehru Technological University Hyderabad, India Dr. Vijayalakshmi M. N., R.V.College of Engineering, Bangalore Prof. Walid Moudani, Lebanese University, Lebanon Dr. Saurabh Pal, VBS Purvanchal University, Jaunpur, India Associate Prof. Suneet Chaudhary, Dehradun Institute of Technology, India Associate Prof. Dr. Manuj Darbari, BBD University, India Ms. Prema Selvaraj, K.S.R College of Arts and Science, India Assist. Prof. Ms.S.Sasikala, KSR College of Arts & Science, India Mr. Sukhvinder Singh Deora, NC Institute of Computer Sciences, India Dr. Abhay Bansal, Amity School of Engineering & Technology, India Ms. Sumita Mishra, Amity School of Engineering and Technology, India Professor S. Viswanadha Raju, JNT University Hyderabad, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  280. Mr. Asghar Shahrzad Khashandarag, Islamic Azad University Tabriz Branch, India Mr. Manoj Sharma, Panipat Institute of Engg. & Technology, India Mr. Shakeel Ahmed, King Faisal University, Saudi Arabia Dr. Mohamed Ali Mahjoub, Institute of Engineer of Monastir, Tunisia Mr. Adri Jovin J.J., SriGuru Institute of Technology, India Dr. Sukumar Senthilkumar, Universiti Sains Malaysia, Malaysia Mr. Rakesh Bharati, Dehradun Institute of Technology Dehradun, India Mr. Shervan Fekri Ershad, Shiraz International University, Iran Mr. Md. Safiqul Islam, Daffodil International University, Bangladesh Mr. Mahmudul Hasan, Daffodil International University, Bangladesh Prof. Mandakini Tayade, UIT, RGTU, Bhopal, India Ms. Sarla More, UIT, RGTU, Bhopal, India Mr. Tushar Hrishikesh Jaware, R.C. Patel Institute of Technology, Shirpur, India Ms. C. Divya, Dr G R Damodaran College of Science, Coimbatore, India Mr. Fahimuddin Shaik, Annamacharya Institute of Technology & Sciences, India Dr.
  281. M. N. Giri Prasad, JNTUCE,Pulivendula, A.P., India Assist. Prof. Chintan M Bhatt, Charotar University of Science And Technology, India Prof. Sahista Machchhar, Marwadi Education Foundation's Group of institutions, India Assist. Prof. Navnish Goel, S. D. College Of Enginnering & Technology, India Mr. Khaja Kamaluddin, Sirt University, Sirt, Libya Mr. Mohammad Zaidul Karim, Daffodil International, Bangladesh Mr.
  282. M. Vijayakumar, KSR College of Engineering, Tiruchengode, India Mr. S. A. Ahsan Rajon, Khulna University, Bangladesh Dr. Muhammad Mohsin Nazir, LCW University Lahore, Pakistan Mr. Mohammad Asadul Hoque, University of Alabama, USA
  283. Mr. P.V.Sarathchand, Indur Institute of Engineering and Technology, India Mr. Durgesh Samadhiya, Chung Hua University, Taiwan Dr Venu Kuthadi, University of Johannesburg, Johannesburg, RSA Dr. (Er) Jasvir Singh, Guru Nanak Dev University, Amritsar, Punjab, India Mr. Jasmin Cosic, Min. of the Interior of Una-sana canton, B&H, Bosnia and Herzegovina Dr S. Rajalakshmi, Botho College, South Africa Dr. Mohamed Sarrab, De Montfort University, UK Mr. Basappa B. Kodada, Canara Engineering College, India Assist. Prof. K. Ramana, Annamacharya Institute of Technology and Sciences, India Dr. Ashu Gupta, Apeejay Institute of Management, Jalandhar, India Assist. Prof. Shaik Rasool, Shadan College of Engineering & Technology, India Assist. Prof. K. Suresh, Annamacharya Institute of Tech & Sci. Rajampet, AP, India Dr . G. Singaravel, K.S.R. College of Engineering, India Dr B. G. Geetha, K.S.R. College of Engineering, India Assist. Prof. Kavita Choudhary, ITM University, Gurgaon Dr. Mehrdad Jalali, Azad University, Mashhad, Iran
  284. Megha Goel, Shamli Institute of Engineering and Technology, Shamli, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  285. Mr. Chi-Hua Chen, Institute of Information Management, National Chiao-Tung University, Taiwan (R.O.C.)
  286. Assoc. Prof. A. Rajendran, RVS College of Engineering and Technology, India Assist. Prof. S. Jaganathan, RVS College of Engineering and Technology, India Assoc. Prof. (Dr.) A S N Chakravarthy, JNTUK University College of Engineering Vizianagaram (State University)
  287. Mohan H.S, SJB Institute Of Technology, India Mr. Hossein Malekinezhad, Islamic Azad University, Iran Mr. Zatin Gupta, Universti Malaysia, Malaysia Assist. Prof. Amit Chauhan, Phonics Group of Institutions, India Assist. Prof. Ajal A. J., METS School Of Engineering, India Mrs. Omowunmi Omobola Adeyemo, University of Ibadan, Nigeria Dr. Bharat Bhushan Agarwal, I.F.T.M. University, India Md. Nazrul Islam, University of Western Ontario, Canada Tushar Kanti, L.N.C.T, Bhopal, India Er. Aumreesh Kumar Saxena, SIRTs College Bhopal, India Mr. Mohammad Monirul Islam, Daffodil International University, Bangladesh Dr. Kashif Nisar, University Utara Malaysia, Malaysia Dr. Wei Zheng, Rutgers Univ/ A10 Networks, USA
  288. Associate Prof. Rituraj Jain, Vyas Institute of Engg & Tech, Jodhpur -Rajasthan Assist. Prof. Apoorvi Sood, I.T.M. University, India Dr. Kayhan Zrar Ghafoor, University Technology Malaysia, Malaysia Mr. Swapnil Soner, Truba Institute College of Engineering & Technology, Indore, India Ms. Yogita Gigras, I.T.M. University, India
  289. Asoke Nath, St. Xavier's College, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  290. Mr. Masoud Rafighi, Islamic Azad University, Iran Assist. Prof. RamBabu Pemula, NIMRA College of Engineering & Technology, India Assist. Prof. Ms Rita Chhikara, ITM University, Gurgaon, India Mr. Sandeep Maan, Government Post Graduate College, India Prof. Dr. S. Muralidharan, Mepco Schlenk Engineering College, India Associate Prof. T.V.Sai Krishna, QIS College of Engineering and Technology, India Mr. R. Balu, Bharathiar University, Coimbatore, India Assist. Prof. Shekhar. R, Dr.SM College of Engineering, India
  291. Prof. P. Senthilkumar, Vivekanandha Institue of Engineering and Techology for Woman, India Mr.
  292. M. Kamarajan, PSNA College of Engineering & Technology, India Dr. Angajala Srinivasa Rao, Jawaharlal Nehru Technical University, India Assist. Prof. C. Venkatesh, A.I.T.S, Rajampet, India Mr. Afshin Rezakhani Roozbahani, Ayatollah Boroujerdi University, Iran Mr. Laxmi chand, SCTL, Noida, India Dr. Dr. Abdul Hannan, Vivekanand College, Aurangabad Prof. Mahesh Panchal, KITRC, Gujarat Dr.
  293. A. Subramani, K.S.R. College of Engineering, Tiruchengode Assist. Prof. Prakash M, Rajalakshmi Engineering College, Chennai, India Assist. Prof. Akhilesh K Sharma, Sir Padampat Singhania University, India Ms. Varsha Sahni, Guru Nanak Dev Engineering College, Ludhiana, India Associate Prof. Trilochan Rout, NM Institute of Engineering and Technlogy, India Mr. Srikanta Kumar Mohapatra, NMIET, Orissa, India Mr. Waqas Haider Bangyal, Iqra University Islamabad, Pakistan Dr. S. Vijayaragavan, Christ College of Engineering and Technology, Pondicherry, India Prof. Elboukhari Mohamed, University Mohammed First, Oujda, Morocco Dr. Muhammad Asif Khan, King Faisal University, Saudi Arabia Dr. Nagy Ramadan Darwish Omran, Cairo University, Egypt.
  294. Assistant Prof. Anand Nayyar, KCL Institute of Management and Technology, India Mr. G. Premsankar, Ericcson, India Assist. Prof. T. Hemalatha, VELS University, India Prof. Tejaswini Apte, University of Pune, India Dr. Edmund Ng Giap Weng, Universiti Malaysia Sarawak, Malaysia Mr. Mahdi Nouri, Iran University of Science and Technology, Iran Associate Prof. S. Asif Hussain, Annamacharya Institute of technology & Sciences, India Mrs. Kavita Pabreja, Maharaja Surajmal Institute (an affiliate of GGSIP University), India Mr. Vorugunti Chandra Sekhar, DA-IICT, India Mr. Muhammad Najmi Ahmad Zabidi, Universiti Teknologi Malaysia, Malaysia Dr. Aderemi A. Atayero, Covenant University, Nigeria Assist. Prof. Osama Sohaib, Balochistan University of Information Technology, Pakistan Assist. Prof. K. Suresh, Annamacharya Institute of Technology and Sciences, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Malaysia Mr. Robail Yasrab, Virtual University of Pakistan, Pakistan (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  295. Mr. R. Balu, Bharathiar University, Coimbatore, India Prof. Anand Nayyar, KCL Institute of Management and Technology, Jalandhar Assoc. Prof. Vivek S Deshpande, MIT College of Engineering, India Prof. K. Saravanan, Anna university Coimbatore, India Dr. Ravendra Singh, MJP Rohilkhand University, Bareilly, India Mr.
  296. V. Mathivanan, IBRA College of Technology, Sultanate of OMAN Assoc. Prof. S. Asif Hussain, AITS, India Assist. Prof. C. Venkatesh, AITS, India Mr. Sami Ulhaq, SZABIST Islamabad, Pakistan Dr. B. Justus Rabi, Institute of Science & Technology, India Mr. Anuj Kumar Yadav, Dehradun Institute of technology, India Mr. Alejandro Mosquera, University of Alicante, Spain Assist. Prof. Arjun Singh, Sir Padampat Singhania University (SPSU), Udaipur, India Dr. Smriti Agrawal, JB Institute of Engineering and Technology, Hyderabad Assist. Prof. Swathi Sambangi, Visakha Institute of Engineering and Technology, India Ms. Prabhjot Kaur, Guru Gobind Singh Indraprastha University, India Mrs. Samaher AL-Hothali, Yanbu University College, Saudi Arabia Prof. Rajneeshkaur Bedi, MIT College of Engineering, Pune, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Dr.
  297. Wei Zhang, Amazon.com, Seattle, WA, USA Mr. B. Santhosh Kumar, C S I College of Engineering, Tamil Nadu Dr. K. Reji Kumar, , N S S College, Pandalam, India Assoc. Prof. K. Seshadri Sastry, EIILM University, India Mr. Kai Pan, UNC Charlotte, USA Mr. Ruikar Sachin, SGGSIET, India Prof. (Dr.) Vinodani Katiyar, Sri Ramswaroop Memorial University, India Assoc. Prof., M. Giri, Sreenivasa Institute of Technology and Management Studies, India Assoc. Prof. Labib Francis Gergis, Misr Academy for Engineering and Technology (MET), Egypt Assist. Prof. Amanpreet Kaur, ITM University, India
  298. Assist. Prof. Anand Singh Rajawat, Shri Vaishnav Institute of Technology & Science, Indore Mrs. Hadeel Saleh Haj Aliwi, Universiti Sains Malaysia (USM), Malaysia Dr. Abhay Bansal, Amity University, India Dr. Mohammad A. Mezher, Fahad Bin Sultan University, KSA Assist. Prof. Nidhi Arora, M.C.A. Institute, India Prof. Dr. P. Suresh, Karpagam College of Engineering, Coimbatore, India Dr. Kannan Balasubramanian, Mepco Schlenk Engineering College, India Dr. S. Sankara Gomathi, Panimalar Engineering college, India Prof. Anil kumar Suthar, Gujarat Technological University, L.C. Institute of Technology, India Assist. Prof. R. Hubert Rajan, NOORUL ISLAM UNIVERSITY, India Assist. Prof. Dr. Jyoti Mahajan, College of Engineering & Technology Assist. Prof. Homam Reda El-Taj, College of Network Engineering, Saudi Arabia & Malaysia Mr. Bijan Paul, Shahjalal University of Science & Technology, Bangladesh (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  299. Assoc. Prof. Dr. Ch V Phani Krishna, KL University, India Dr. Vishal Bhatnagar, Ambedkar Institute of Advanced Communication Technologies & Research, India Dr. Lamri LAOUAMER, Al Qassim University, Dept. Info. Systems & European University of Brittany, Dept. Computer Science, UBO, Brest, France Prof. Ashish Babanrao Sasankar, G.H.Raisoni Institute Of Information Technology, India Prof. Pawan Kumar Goel, Shamli Institute of Engineering and Technology, India Mr. Ram Kumar Singh, S.V Subharti University, India Assistant Prof. Sunish Kumar O S, Amaljyothi College of Engineering, India Dr Sanjay Bhargava, Banasthali University, India Mr. Pankaj S. Kulkarni, AVEW's Shatabdi Institute of Technology, India Mr. Roohollah Etemadi, Islamic Azad University, Iran Mr. Oloruntoyin Sefiu Taiwo, Emmanuel Alayande College Of Education, Nigeria Mr. Sumit Goyal, National Dairy Research Institute, India Mr Jaswinder Singh Dilawari, Geeta Engineering College, India Prof. Raghuraj Singh, Harcourt Butler Technological Institute, Kanpur Dr. S.K. Mahendran, Anna University, Chennai, India Dr. Amit Wason, Hindustan Institute of Technology & Management, Punjab Dr.
  300. Ashu Gupta, Apeejay Institute of Management, India Assist. Prof. D. Asir Antony Gnana Singh, M.I.E.T Engineering College, India Mrs Mina Farmanbar, Eastern Mediterranean University, Famagusta, North Cyprus Mr. Maram Balajee, GMR Institute of Technology, India Mr. Moiz S. Ansari, Isra University, Hyderabad, Pakistan Mr. Adebayo, Olawale Surajudeen, Federal University of Technology Minna, Nigeria Mr. Jasvir Singh, University College Of Engg., India Mr. Vivek Tiwari, MANIT, Bhopal, India
  301. Assoc. Prof. R. Navaneethakrishnan, Bharathiyar College of Engineering and Technology, India Mr. Somdip Dey, St. Xavier's College, Kolkata, India Mr. Souleymane Balla-Arabé, Xi'an University of Electronic Science and Technology, China Mr. Mahabub Alam, Rajshahi University of Engineering and Technology, Bangladesh Mr.
  302. Sathyapraksh P., S.K.P Engineering College, India Dr. N. Karthikeyan, SNS College of Engineering, Anna University, India Dr. Binod Kumar, JSPM's, Jayawant Technical Campus, Pune, India Assoc. Prof. Dinesh Goyal, Suresh Gyan Vihar University, India Mr. Md. Abdul Ahad, K L University, India Mr. Vikas Bajpai, The LNM IIT, India Dr. Manish Kumar Anand, Salesforce (R & D Analytics), San Francisco, USA Assist. Prof. Dheeraj Murari, Kumaon Engineering College, India Assoc. Prof. Dr. A. Muthukumaravel, VELS University, Chennai Mr. A. Siles Balasingh, St.Joseph University in Tanzania, Tanzania Mr. Ravindra Daga Badgujar, R C Patel Institute of Technology, India Dr. Preeti Khanna, SVKM's NMIMS, School of Business Management, India Mr. Kumar Dayanand, Cambridge Institute of Technology, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  303. Dr. Syed Asif Ali, SMI University Karachi, Pakistan Prof. Pallvi Pandit, Himachal Pradeh University, India Mr. Ricardo Verschueren, University of Gloucestershire, UK
  304. Assist. Prof. Mamta Juneja, University Institute of Engineering and Technology, Panjab University, India Assoc. Prof. P. Surendra Varma, NRI Institute of Technology, JNTU Kakinada, India Assist. Prof. Gaurav Shrivastava, RGPV / SVITS Indore, India Dr. S. Sumathi, Anna University, India Assist. Prof. Ankita M. Kapadia, Charotar University of Science and Technology, India Mr. Deepak Kumar, Indian Institute of Technology (BHU), India Dr. Dr. Rajan Gupta, GGSIP University, New Delhi, India Assist. Prof M. Anand Kumar, Karpagam University, Coimbatore, India Mr. Mr Arshad Mansoor, Pakistan Aeronautical Complex Mr. Kapil Kumar Gupta, Ansal Institute of Technology and Management, India Dr. Neeraj Tomer, SINE International Institute of Technology, Jaipur, India Assist. Prof. Trunal J. Patel, C.G.Patel Institute of Technology, Uka Tarsadia University, Bardoli, Surat Mr. Sivakumar, Codework solutions, India Mr. Mohammad Sadegh Mirzaei, PGNR Company, Iran Dr. Gerard G. Dumancas, Oklahoma Medical Research Foundation, USA Mr. Varadala Sridhar, Varadhaman College Engineering College, Affiliated To JNTU, Hyderabad Assist. Prof. Manoj Dhawan, SVITS, Indore
  305. Assoc. Prof. Chitreshh Banerjee, Suresh Gyan Vihar University, Jaipur, India Dr. S. Santhi, SCSVMV University, India Mr. Davood Mohammadi Souran, Ministry of Energy of Iran, Iran Mr. Shamim Ahmed, Bangladesh University of Business and Technology, Bangladesh Mr. Sandeep Reddivari, Mississippi State University, USA Assoc. Prof. Ousmane Thiare, Gaston Berger University, Senegal Dr. Hazra Imran, Athabasca University, Canada Dr. Setu Kumar Chaturvedi, Technocrats Institute of Technology, Bhopal, India Mr. Mohd Dilshad Ansari, Jaypee University of Information Technology, India Ms. Jaspreet Kaur, Distance Education LPU, India Dr. D. Nagarajan, Salalah College of Technology, Sultanate of Oman Dr. K.V.N.R.Sai Krishna, S.V.R.M. College, India Mr. Himanshu Pareek, Center for Development of Advanced Computing (CDAC), India Mr. Khaldi Amine, Badji Mokhtar University, Algeria Mr. Mohammad Sadegh Mirzaei, Scientific Applied University, Iran Assist. Prof. Khyati Chaudhary, Ram-eesh Institute of Engg. & Technology, India Mr. Sanjay Agal, Pacific College of Engineering Udaipur, India Mr. Abdul Mateen Ansari, King Khalid University, Saudi Arabia Dr. H.S. Behera, Veer Surendra Sai University of Technology (VSSUT), India Dr. Shrikant Tiwari, Shri Shankaracharya Group of Institutions (SSGI), India Prof. Ganesh B. Regulwar, Shri Shankarprasad Agnihotri College of Engg, India Prof. Pinnamaneni Bhanu Prasad, Matrix vision GmbH, Germany (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  306. Dr. Shrikant Tiwari, Shri Shankaracharya Technical Campus (SSTC), India Dr. Siddesh G.K., : Dayananada Sagar College of Engineering, Bangalore, India Dr. Nadir Bouchama, CERIST Research Center, Algeria Dr. R. Sathishkumar, Sri Venkateswara College of Engineering, India Assistant Prof (Dr.) Mohamed Moussaoui, Abdelmalek Essaadi University, Morocco Dr. S. Malathi, Panimalar Engineering College, Chennai, India Dr.
  307. V. Subedha, Panimalar Institute of Technology, Chennai, India Dr. Prashant Panse, Swami Vivekanand College of Engineering, Indore, India Dr. Hamza Aldabbas, Al-Balqa'a Applied University, Jordan Dr. G. Rasitha Banu, Vel's University, Chennai Dr.
  308. V. D. Ambeth Kumar, Panimalar Engineering College, Chennai Prof. Anuranjan Misra, Bhagwant Institute of Technology, Ghaziabad, India Ms. U. Sinthuja, PSG college of arts &science, India Dr. Ehsan Saradar Torshizi, Urmia University, Iran Dr. Shamneesh Sharma, APG Shimla University, Shimla (H.P.), India
  309. Assistant Prof. A. S. Syed Navaz, Muthayammal College of Arts & Science, India Assistant Prof. Ranjit Panigrahi, Sikkim Manipal Institute of Technology, Majitar, Sikkim Dr. Khaled Eskaf, Arab Academy for Science ,Technology & Maritime Transportation, Egypt Dr. Nishant Gupta, University of Jammu, India Assistant Prof. Nagarajan Sankaran, Annamalai University, Chidambaram, Tamilnadu, India Assistant Prof.Tribikram Pradhan, Manipal Institute of Technology, India Dr. Nasser Lotfi, Eastern Mediterranean University, Northern Cyprus Dr. R. Manavalan, K S Rangasamy college of Arts and Science, Tamilnadu, India Assistant Prof. P. Krishna Sankar, K S Rangasamy college of Arts and Science, Tamilnadu, India Dr. Rahul Malik, Cisco Systems, USA Dr. S. C. Lingareddy, ALPHA College of Engineering, India Assistant Prof. Mohammed Shuaib, Interal University, Lucknow, India Dr. Sachin Yele, Sanghvi Institute of Management & Science, India Dr.
  310. T. Thambidurai, Sun Univercell, Singapore Prof. Anandkumar Telang, BKIT, India Assistant Prof. R. Poorvadevi, SCSVMV University, India Dr Uttam Mande, Gitam University, India Dr. Poornima Girish Naik, Shahu Institute of Business Education and Research (SIBER), India Prof. Md. Abu Kausar, Jaipur National University, Jaipur, India Dr. Mohammed Zuber, AISECT University, India Prof. Kalum Priyanath Udagepola, King Abdulaziz University, Saudi Arabia Dr. K. R. Ananth, Velalar College of Engineering and Technology, India Assistant Prof. Sanjay Sharma, Roorkee Engineering & Management Institute Shamli (U.P), India Assistant Prof. Panem Charan Arur, Priyadarshini Institute of Technology, India Dr. Ashwak Mahmood muhsen alabaichi, Karbala University / College of Science, Iraq Dr. Urmila Shrawankar, G H Raisoni College of Engineering, Nagpur (MS), India Dr. Krishan Kumar Paliwal, Panipat Institute of Engineering & Technology, India (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  311. Dr. Mukesh Negi, Tech Mahindra, India Dr. Anuj Kumar Singh, Amity University Gurgaon, India Dr. Babar Shah, Gyeongsang National University, South Korea Assistant Prof. Jayprakash Upadhyay, SRI-TECH Jabalpur, India Assistant Prof. Varadala Sridhar, Vidya Jyothi Institute of Technology, India Assistant Prof. Parameshachari B D, KSIT, Bangalore, India Assistant Prof. Ankit Garg, Amity University, Haryana, India Assistant Prof. Rajashe Karappa, SDMCET, Karnataka, India Assistant Prof. Varun Jasuja, GNIT, India Assistant Prof. Sonal Honale, Abha Gaikwad Patil College of Engineering Nagpur, India Dr. Pooja Choudhary, CT Group of Institutions, NIT Jalandhar, India Dr. Faouzi Hidoussi, UHL Batna, Algeria Dr. Naseer Ali Husieen, Wasit University, Iraq Assistant Prof. Vinod Kumar Shukla, Amity University, Dubai Dr. Ahmed Farouk Metwaly, K L University Mr. Mohammed Noaman Murad, Cihan University, Iraq Dr. Suxing Liu, Arkansas State University, USA Dr.
  312. M. Gomathi, Velalar College of Engineering and Technology, India Assistant Prof. Sumardiono, College PGRI Blitar, Indonesia Dr. Latika Kharb, Jagan Institute of Management Studies (JIMS), Delhi, India Associate Prof. S. Raja, Pauls College of Engineering and Technology, Tamilnadu, India Assistant Prof. Seyed Reza Pakize, Shahid Sani High School, Iran Dr. Thiyagu Nagaraj, University-INOU, India Assistant Prof. Noreen Sarai, Harare Institute of Technology, Zimbabwe Assistant Prof. Gajanand Sharma, Suresh Gyan Vihar University Jaipur, Rajasthan, India Assistant Prof. Mapari Vikas Prakash, Siddhant COE, Sudumbare, Pune, India Dr. Devesh Katiyar, Shri Ramswaroop Memorial University, India Dr. Shenshen Liang, University of California, Santa Cruz, US Assistant Prof. Mohammad Abu Omar, Limkokwing University of Creative Technology-Malaysia Mr. Snehasis Banerjee, Tata Consultancy Services, India Assistant Prof. Kibona Lusekelo, Ruaha Catholic University (RUCU), Tanzania Assistant Prof. Adib Kabir Chowdhury, University College Technology Sarawak, Malaysia Dr. Ying Yang, Computer Science Department, Yale University, USA Dr. Vinay Shukla, Institute Of Technology & Management, India Dr. Liviu Octavian Mafteiu-Scai, West University of Timisoara, Romania Assistant Prof. Rana Khudhair Abbas Ahmed, Al-Rafidain University College, Iraq Assistant Prof. Nitin A. Naik, S.R.T.M. University, India Dr. Timothy Powers, University of Hertfordshire, UK Dr. S. Prasath, Bharathiar University, Erode, India Dr. Ritu Shrivastava, SIRTS Bhopal, India Prof. Rohit Shrivastava, Mittal Institute of Technology, Bhopal, India Dr. Gianina Mihai, Dunarea de Jos" University of Galati, Romania (IJCSIS) International Journal of Computer Science and Information Security, Vol. 13 No. 6, June 2015
  313. Assistant Prof. Ms. T. Kalai Selvi, Erode Sengunthar Engineering College, India Assistant Prof. Ms. C. Kavitha, Erode Sengunthar Engineering College, India Assistant Prof. K. Sinivasamoorthi, Erode Sengunthar Engineering College, India Assistant Prof. Mallikarjun C Sarsamba Bheemnna Khandre Institute Technology, Bhalki, India Assistant Prof. Vishwanath Chikaraddi, Veermata Jijabai technological Institute (Central Technological Institute), India
  314. Assistant Prof. Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, India Assistant Prof. Mohammed Noaman Murad, Cihan University, Iraq Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Dr. Parul Verma, Amity University, India Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Assistant Prof. Madhavi Dhingra, Amity University, Madhya Pradesh, India Assistant Prof.. G. Selvavinayagam, SNS College of Technology, Coimbatore, India Assistant Prof. Madhavi Dhingra, Amity University, MP, India Professor Kartheesan Log, Anna University, Chennai Professor Vasudeva Acharya, Shri Madhwa vadiraja Institute of Technology, India Dr. Asif Iqbal Hajamydeen, Management & Science University, Malaysia Assistant Prof., Mahendra Singh Meena, Amity University Haryana Assistant Professor Manjeet Kaur, Amity University Haryana Dr. Mohamed Abd El-Basset Matwalli, Zagazig University, Egypt Dr. Ramani Kannan, Universiti Teknologi PETRONAS, Malaysia Assistant Prof. S. Jagadeesan Subramaniam, Anna University, India Assistant Prof. Dharmendra Choudhary, Tripura University, India Assistant Prof. Deepika Vodnala, SR Engineering College, India Dr. Kai Cong, Intel Corporation & Computer Science Department, Portland State University, USA Dr. Kailas R Patil, Vishwakarma Institute of Information Technology (VIIT), India Dr. Omar A. Alzubi, Faculty of IT / Al-Balqa Applied University, Jordan Assistant Prof. Kareemullah Shaik, Nimra Institute of Science and Technology, India Assistant Prof. Chirag Modi, NIT Goa CALL FOR PAPERS International Journal of Computer Science and Information Security IJCSIS 2015 ISSN: 1947-5500 http://sites.google.com/site/ijcsis/ International Journal Computer Science and Information Security, IJCSIS, is the premier scholarly venue in the areas of computer science and security issues. IJCSIS 2011 will provide a high profile, leading edge platform for researchers and engineers alike to publish state-of-the-art research in the respective fields of information technology and communication security. The journal will feature a diverse mixture of publication articles including core and applied computer science related topics. Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Submissions may span a broad range of topics, e.g.: Track A: Security Access control, Anonymity, Audit and audit reduction & Authentication and authorization, Applied cryptography, Cryptanalysis, Digital Signatures, Biometric security, Boundary control devices, Certification and accreditation, Cross-layer design for security, Security & Network Management, Data and system integrity, Database security, Defensive information warfare, Denial of service protection, Intrusion Detection, Anti-malware, Distributed systems security, Electronic commerce, E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection, Grid security, Information hiding and watermarking & Information survivability, Insider threat protection, Integrity Intellectual property protection, Internet/Intranet Security, Key management and key recovery, Language- based security, Mobile and wireless security, Mobile, Ad Hoc and Sensor Network Security, Monitoring and surveillance, Multimedia security ,Operating system security, Peer-to-peer security, Performance Evaluations of Protocols & Security Application, Privacy and data protection, Product evaluation criteria and compliance, Risk evaluation and security certification, Risk/vulnerability assessment, Security & Network Management, Security Models & protocols, Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,), Trusted computing, Ubiquitous Computing Security, Virtualization security, VoIP security, Web 2.0 security, Submission Procedures, Active Defense Systems, Adaptive Defense Systems, Benchmark, Analysis and Evaluation of Security Systems, Distributed Access Control and Trust Management, Distributed Attack Systems and Mechanisms, Distributed Intrusion Detection/Prevention Systems, Denial-of-Service Attacks and Countermeasures, High Performance Security Systems, Identity Management and Authentication, Implementation, Deployment and Management of Security Systems, Intelligent Defense Systems, Internet and Network Forensics, Large- scale Attacks and Defense, RFID Security and Privacy, Security Architectures in Distributed Network Systems, Security for Critical Infrastructures, Security for P2P systems and Grid Systems, Security in E- Commerce, Security and Privacy in Wireless Networks, Secure Mobile Agents and Mobile Code, Security Protocols, Security Simulation and Tools, Security Theory and Tools, Standards and Assurance Methods, Trusted Computing, Viruses, Worms, and Other Malicious Code, World Wide Web Security, Novel and emerging secure architecture, Study of attack strategies, attack modeling, Case studies and analysis of actual attacks, Continuity of Operations during an attack, Key management, Trust management, Intrusion detection techniques, Intrusion response, alarm management, and correlation analysis, Study of tradeoffs between security and system performance, Intrusion tolerance systems, Secure protocols, Security in wireless networks (e.g. mesh networks, sensor networks, etc.), Cryptography and Secure Communications, Computer Forensics, Recovery and Healing, Security Visualization, Formal Methods in Security, Principles for Designing a Secure Computing System, Autonomic Security, Internet Security, Security in Health Care Systems, Security Solutions Using Reconfigurable Computing, Adaptive and Intelligent Defense Systems, Authentication and Access control, Denial of service attacks and countermeasures, Identity, Route and Location Anonymity schemes, Intrusion detection and prevention techniques, Cryptography, encryption algorithms and Key management schemes, Secure routing schemes, Secure neighbor discovery and localization, Trust establishment and maintenance, Confidentiality and data integrity, Security architectures, deployments and solutions, Emerging threats to cloud-based services, Security model for new services, Cloud-aware web service security, Information hiding in Cloud Computing, Securing distributed data storage in cloud, Security, privacy and trust in mobile computing systems and applications, Middleware security & Security features: middleware software is an asset on its own and has to be protected, interaction between security-specific and other middleware features, e.g., context-awareness, Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware, Security co-design: trade-off and co-design between application-based and middleware-based security, Policy-based management: innovative support for policy-based definition and enforcement of security concerns, Identification and authentication mechanisms: Means to capture application specific constraints in defining and enforcing access control rules, Middleware-oriented security patterns: identification of patterns for sound, reusable security, Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects, Security in agent-based platforms: protection for mobile code and platforms, Smart Devices: Biometrics, National ID cards, Embedded Systems Security and TPMs, RFID Systems Security, Smart Card Security, Pervasive Systems: Digital Rights Management (DRM) in pervasive environments, Intrusion Detection and Information Filtering, Localization Systems Security (Tracking of People and Goods), Mobile Commerce Security, Privacy Enhancing Technologies, Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity), Ubiquitous Networks: Ad Hoc Networks Security, Delay- Tolerant Network Security, Domestic Network Security, Peer-to-Peer Networks Security, Security Issues in Mobile and Ubiquitous Networks, Security of GSM/GPRS/UMTS Systems, Sensor Networks Security, Vehicular Network Security, Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others This Track will emphasize the design, implementation, management and applications of computer communications, networks and services. Topics of mostly theoretical nature are also welcome, provided there is clear practical potential in applying the results of such work. Track B: Computer Science Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA, Resource allocation and interference management, Quality of service and scheduling methods, Capacity planning and dimensioning, Cross-layer design and Physical layer based issue, Interworking architecture and interoperability, Relay assisted and cooperative communications, Location and provisioning and mobility management, Call admission and flow/congestion control, Performance optimization, Channel capacity modeling and analysis, Middleware Issues: Event-based, publish/subscribe, and message-oriented middleware, Reconfigurable, adaptable, and reflective middleware approaches, Middleware solutions for reliability, fault tolerance, and quality-of-service, Scalability of middleware, Context-aware middleware, Autonomic and self-managing middleware, Evaluation techniques for middleware solutions, Formal methods and tools for designing, verifying, and evaluating, middleware, Software engineering techniques for middleware, Service oriented middleware, Agent-based middleware, Security middleware, Network Applications: Network-based automation, Cloud applications, Ubiquitous and pervasive applications, Collaborative applications, RFID and sensor network applications, Mobile applications, Smart home applications, Infrastructure monitoring and control applications, Remote health monitoring, GPS and location-based applications, Networked vehicles applications, Alert applications, Embeded Computer System, Advanced Control Systems, and Intelligent Control : Advanced control and measurement, computer and microprocessor-based control, signal processing, estimation and identification techniques, application specific IC's, nonlinear and adaptive control, optimal and robot control, intelligent control, evolutionary computing, and intelligent systems, instrumentation subject to critical conditions, automotive, marine and aero-space control and all other control applications, Intelligent Control System, Wiring/Wireless Sensor, Signal Control System. Sensors, Actuators and Systems Integration : Intelligent sensors and actuators, multisensor fusion, sensor array and multi-channel processing, micro/nano technology, microsensors and microactuators, instrumentation electronics, MEMS and system integration, wireless sensor, Network Sensor, Hybrid Sensor, Distributed Sensor Networks. Signal and Image Processing : Digital signal processing theory, methods, DSP implementation, speech processing, image and multidimensional signal processing, Image analysis and processing, Image and Multimedia applications, Real-time multimedia signal processing, Computer vision, Emerging signal processing areas, Remote Sensing, Signal processing in education. Industrial Informatics: Industrial applications of neural networks, fuzzy algorithms, Neuro-Fuzzy application, bioInformatics, real-time computer control, real-time information systems, human-machine interfaces, CAD/CAM/CAT/CIM, virtual reality, industrial communications, flexible manufacturing systems, industrial automated process, Data Storage Management, Harddisk control, Supply Chain Management, Logistics applications, Power plant automation, Drives automation. Information Technology, Management of Information System : Management information systems, Information Management, Nursing information management, Information System, Information Technology and their application, Data retrieval, Data Base Management, Decision analysis methods, Information processing, Operations research, E-Business, E-Commerce, E-Government, Computer Business, Security and risk management, Medical imaging, Biotechnology, Bio-Medicine, Computer-based information systems in health care, Changing Access to Patient Information, Healthcare Management Information Technology.
  315. Communication/Computer Network, Transportation Application : On-board diagnostics, Active safety systems, Communication systems, Wireless technology, Communication application, Navigation and Guidance, Vision-based applications, Speech interface, Sensor fusion, Networking theory and technologies, Transportation information, Autonomous vehicle, Vehicle application of affective computing, Advance Computing technology and their application : Broadband and intelligent networks, Data Mining, Data fusion, Computational intelligence, Information and data security, Information indexing and retrieval, Information processing, Information systems and applications, Internet applications and performances, Knowledge based systems, Knowledge management, Software Engineering, Decision making, Mobile networks and services, Network management and services, Neural Network, Fuzzy logics, Neuro-Fuzzy, Expert approaches, Innovation Technology and Management : Innovation and product development, Emerging advances in business and its applications, Creativity in Internet management and retailing, B2B and B2C management, Electronic transceiver device for Retail Marketing Industries, Facilities planning and management, Innovative pervasive computing applications, Programming paradigms for pervasive systems, Software evolution and maintenance in pervasive systems, Middleware services and agent technologies, Adaptive, autonomic and context-aware computing, Mobile/Wireless computing systems and services in pervasive computing, Energy-efficient and green pervasive computing, Communication architectures for pervasive computing, Ad hoc networks for pervasive communications, Pervasive opportunistic communications and applications, Enabling technologies for pervasive systems (e.g., wireless BAN, PAN), Positioning and tracking technologies, Sensors and RFID in pervasive systems, Multimodal sensing and context for pervasive applications, Pervasive sensing, perception and semantic interpretation, Smart devices and intelligent environments, Trust, security and privacy issues in pervasive systems, User interfaces and interaction models, Virtual immersive communications, Wearable computers, Standards and interfaces for pervasive computing environments, Social and economic models for pervasive systems, Active and Programmable Networks, Ad Hoc & Sensor Network, Congestion and/or Flow Control, Content Distribution, Grid Networking, High-speed Network Architectures, Internet Services and Applications, Optical Networks, Mobile and Wireless Networks, Network Modeling and Simulation, Multicast, Multimedia Communications, Network Control and Management, Network Protocols, Network Performance, Network Measurement, Peer to Peer and Overlay Networks, Quality of Service and Quality of Experience, Ubiquitous Networks, Crosscutting Themes -Internet Technologies, Infrastructure, Services and Applications; Open Source Tools, Open Models and Architectures; Security, Privacy and Trust; Navigation Systems, Location Based Services; Social Networks and Online Communities; ICT Convergence, Digital Economy and Digital Divide, Neural Networks, Pattern Recognition, Computer Vision, Advanced Computing Architectures and New Programming Models, Visualization and Virtual Reality as Applied to Computational Science, Computer Architecture and Embedded Systems, Technology in Education, Theoretical Computer Science, Computing Ethics, Computing Practices & Applications Authors are invited to submit papers through e-mail ijcsiseditor@gmail.com. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated by IJCSIS. Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://sites.google.com/site/ijcsis/authors-notes .